What Are You Doing About Microsoft 365 Phishing Security? – Webinar

Exploring findings from a recent survey on security performance, the most prevalent models for SOCs, SIEM integration, how the migration to Microsoft 365 was managed, types of additional security they’ve deployed, time spent remediating breaches, security budget growth, and how users report suspicious emails, along with expectations on new defensive technologies and services. Sponsored by Cyren.

New Methods for Solving Phishing, Business Email Compromise, Account Takeovers and Other Security Threats – White Paper

The network in most organizations has a dramatically expanded attack surface. There is no longer a defensible perimeter that can fully protect corporate data, and so new approaches, technologies and practices are needed to protect corporate data and finances. Sponsored by Agari, Carbon Black, GoSecure, KnowBe4, MDaemon, Proofpoint, SlashNext, Trend Micro, Trustwave and Zix