Abstract Violet Joint

Email Attack Insights from the Top Names in Cybersecurity

Join us for a three-part webinar series about the most serious email-based threats, featuring some of the biggest names in cybersecurity.

July 27, 2022

Over the last decade, email has affirmed its position as the preferred channel for communication in the workplace. And with the transition of hundreds of thousands of organizations to fully remote or hybrid work environments, our collective dependence on email has only gotten stronger.

Threat actors recognize this, which is why email’s popularity as an attack vector has grown considerably in recent years. In fact, losses due to email fraud are up 64% since 2020, with the FBI reporting $6.9 billion in cybercrime losses last year.

But cybercriminals aren’t nearly as interested in basic malware, spam, and simple phishing as they were in the past. Instead, they’re focused on high-value, high-impact attacks like business email compromise (BEC), account takeovers, and ransomware. Email attacks have shifted, and email security needs to shift too.

Over the next three months, we'll be joined by cybersecurity heavy-hitters for a three-part webinar series on this topic. Throughout the webinars, we’ll discuss how advanced email attacks started, how they’re evolving, and why they should be a top concern for security professionals worldwide.

Tune in to learn what you can do to protect your organization from email-based threats with industry experts Chris Krebs, Troy Hunt, and Theresa Payton.

Modern Attacks BEC Icon

Chris Krebs on BEC: Business Email Compromise as Your Biggest Concern

  • Date: Thursday, August 4, 2022
  • Time: 10:00 AM PT
  • Duration: 1.25 hours
  • CPE Credit(s): 1

Leading the national effort to recognize, manage, and reduce risk to our cyber infrastructure is no easy role, but if anyone understands it, that person is Chris Krebs. As Director of the Cybersecurity and Infrastructure Security Agency (CISA) from 2018 to 2020, Krebs led the national effort to keep the United States safe from cyberattacks in all forms.

Join us for this webinar, where he’ll be discussing how the cybersecurity effort plays out in the email vector, with insights into how cybercriminals use email to attack individuals, enterprises, and government organizations. With estimated losses of $43 billion since 2016, business email compromise (BEC) is our largest cybersecurity concern—and it should be yours too.

I'll be speaking with Krebs, answering questions including:

  • How have you seen business email compromise evolve over the last several years?

  • What are some of the most sophisticated attacks you’ve seen, and how were they stopped?

  • Why is BEC still impacting enterprises and government organizations today, despite efforts to stop it?

  • How do you see email evolving as a threat vector in the future?

And much more. Don’t miss this opportunity to hear from government expert Chris Krebs.

Chris Krebs is the founding partner of Krebs Stamos Group, a cybersecurity consulting firm. He previously served as the first director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Director for Cybersecurity Policy for Microsoft.

Register for Chris Krebs on BEC: Business Email Compromise as Your Biggest Concern

Modern Attacks ATO Icon

Troy Hunt on ATO: Account Takeovers as the Hidden Threat

  • Date: Wednesday, September 7, 2022
  • Time: 10:00 AM PT
  • Duration: 1 hour
  • CPE Credit(s): 1

The average cost of a data breach is now $4.24 million. And 20% of all breaches are a result of compromised credentials. What makes matters worse is that it takes an average of 250 days to realize that the compromise has even occurred, and another 91 days to contain the breach.

It’s clear that account takeovers pose a significant risk to organizations and their employees. To learn more about this risk and how to best avoid it, join us for a webinar with Troy Hunt, the brains behind HaveIBeenPwned.com.

Hunt and I will sit down to chat about questions including:

  • How do account takeovers occur, both for individuals and organizations?

  • What can cybercriminals do once they gain access to even one email account?

  • Why does the number of compromises continue to grow, despite increased security measures?

  • What can you do to prevent your organization from becoming a victim of the next data breach?

And much more. With key insights from an expert in compromised credentials, you won’t want to miss this session.

Troy Adam Hunt is an Australian web security consultant known for public education and outreach on security topics. He created Have I Been Pwned?, a data breach search website that allows users to see if their personal information has been compromised.

Register for Troy Hunt on ATO: Account Takeovers as the Hidden Threat

Modern Attacks Malware Icon

Theresa Payton on Ransomware: Malware as an Ongoing Email Issue

  • Date: Tuesday, October 11, 2022
  • Time: 10:00 AM PT
  • Duration: 1 hour
  • CPE Credit(s): 1

When it comes to ransomware, cybercriminals are upping the ante. Delivery methods have evolved, payouts are growing in frequency and total cost, and there are more malicious actors participating in ransomware than ever before.

Since the beginning of 2020, we’ve seen a 600% increase in the number of active ransomware groups. Clearly, threat actors are noticing an easy entry point—particularly through email.

Join this session featuring Theresa Payton, cybersecurity expert and the first female White House CIO, where we’ll discuss why over 76% of ransomware is delivered through email.

I'll be speaking with Payton, answering questions like:

  • What are the main ransomware attack vectors, and how do they work?

  • How have malware and ransomware evolved over the past decade and why are these attacks so much more dangerous today?

  • Why are your employees still being held for ransom, despite increased awareness?

  • What can you do to protect your inboxes (and your organization) from this threat?

And much more. Don’t miss this opportunity to learn about email as the ever-evolving ransomware entry point.

Theresa Payton is the co-founder of Dark3, a cybersecurity solution, and CEO of Fortalice Solutions, a provider of cybersecurity consulting services. She was also the first-ever female White House CIO and was named 2019 Woman Cybersecurity Leader of the Year.

Register for Theresa Payton on Ransomware: Malware as an Ongoing Email Issue

Sign Up Today for Expert Insights

We invite you to sign up for any (or all three) of these webinars. Don’t miss this opportunity to hear about the latest trends in cybercrime from some of the biggest names in cybersecurity.

To learn more about the current email threat landscape and how security professionals are responding, download our 2022 Email Security Trends Report, which features data from 300 security leaders.


Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 1500x1500 Gartner Peer Insights Reviews blog
The Abnormal Security team is committed to providing the best possible solution and support experience to every customer. Here’s what a few of our customers have to say about us.
Read More
B Podcast Engineering 10 07 27 22
In episode 10 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sits down with Zehan Wang, co-founder of Magic Pony.
Read More
B 1500x1500 Email Attack Insights
Join us for a three-part webinar series about the most serious email-based threats, featuring some of the biggest names in cybersecurity.
Read More
B 07 22 22 Webinar Recap
Credential phishing attacks can lead to loss of revenue, loss of data, and long-term reputational damage. Learn why these attacks are successful and how to block them.
Read More
B 07 19 22 2022 Email Security Trends 1
Our new survey explores the current email threat landscape and what security leaders are doing to stay ahead of increasingly sophisticated attacks.
Read More
B 07 14 22 4types
Understanding the ways cybercriminals execute financial supply chain compromise is key to preventing your organization from falling victim to an attack.
Read More
B 07 07 22 Financial Supply Chain Compromise
Financial supply chain compromise, a subset of business email compromise (BEC), is on the rise. Learn how threat actors launch these sophisticated attacks.
Read More
B 06 15 22 Coats Webinar Recap Blog
Learn why Coats, the global leader in industrial thread manufacturing, skipped the SEG and chose Abnormal Integrated Cloud Email Security (ICES) to protect its workforce from modern email threats.
Read More
B 07 30 22 Q2 2022
We’re dedicated to keeping security professionals informed about the latest email threats. Here are a few of our favorite blog posts from Q2 2022.
Read More
B 06 21 22 Threat Intel blog
Executives are no longer the go-to impersonated party in business email compromise (BEC) attacks. Now, threat actors are opting to impersonate vendors instead.
Read More
B 06 7 22 Disentangling ML Pipelines Blog
Learn how explicitly modeling dependencies in a machine learning pipeline can vastly reduce its complexity and make it behave like a tower of Legos: easy to change, and hard to break.
Read More
B 04 07 22 SEG
As enterprises across the world struggle to stop modern email attacks, it begs the question: how are these attacks evading traditional solutions like SEGs?
Read More