Uncovering the Threat Potential of the Insider Breaches Using Real-World Email-Based Examples and Techniques

Webinar Registration

The user’s Inbox has become a key part of just about every kind of security threat to organizations. Whether it’s an inbound phishing attack, a malicious insider exfiltrating data, or just a user choosing the wrong recipient name when emailing sensitive data, email – and the user’s interaction with it – plays a pivotal role in enabling these threats.

In this real-training-for-free session, Microsoft MVP and cybersecurity expert Nick Cavalancia takes my seat in this webcast, where he’ll take a look at some of the ways the combination of your user and their Inbox put the organization at risk, including:

  • Business Email Compromise (BEC)
  • Vendor Email Compromise (VEC)
  • Impersonation attacks
  • User Negligence

He’ll walk through each and provide real-world examples of how these attacks take advantage of the accidental insider and put your organization at risk.

Sudeep Venkatesh, Chief Product Officer at Egress will also offer up some insight into the human behaviors and psychology behind various insider breach use cases, providing ways to quickly identify them and the role technology plays in mitigating it, including:

  • Accidental email sends
  • Malicious data exfiltration
  • Accidental data loss
  • Spear phishing

This real training for free event will be jam packed with technical detail and real-world application. Register today!

 
First Name:   
Last Name:   
Work Email:  
Phone:  
Country:    
Employees:  
Industry:  
 

Your information will be shared with the sponsor.

By clicking "Submit", you're agreeing to our Privacy Policy and consenting to be contacted by us.

 

 

Additional Resources