Webinars
Discover how Choice Hotels is simplifying their email security, streamlining their operations, and preventing email attacks with the highest efficacy.
Cybersecurity leaders from Rubrik, Noname, Wiz, and Abnormal Security share their experiences and insights in this on-demand CISO fireside chat.
Learn about the cyber risks associated with more robust, complex cloud email platforms and how security posture management can reduce your vulnerabilities.
Get an in-depth look at the Abnormal platform and see the top 5 features our customers have adopted to successfully mitigate advanced email attacks.
Cybersecurity expert Dr. Eric Cole discusses how the threat landscape is changing and steps you can take to make sure you’re as protected as possible.
In this interview with SecureWorld, Crane Hassold, Abnormal's Director of Threat Intelligence, shares real-world examples of advanced email attacks.
Tas Jalali, Head of Cybersecurity at AC Transit speaks with Abnormal about his security strategy for the new year.
A recap of the key updates and releases Abnormal delivered in 2022, from technical enhancements to entirely new solutions and partnerships.
Discover how security leaders are mitigating new internal threats and the best ways to protect your organization from these new attack opportunities.
Noah Wallace, Director of InfoSec at Progress Residential, shares the success and time-savings he's achieved since partnering with Abnormal.
Hackers Rachel Tobac and James Linton share how to better protect against socially-engineered attacks. Watch the on-demand webinar from Vision 2023.
In this recorded presentation from Vision 2023, leaders from Microsoft and Abnormal share how to protect employees from increasingly sophisticated attacks.
In this on-demand webinar from Vision 2023, security leaders from Acrisure and Abnormal Security discuss how SOC teams can prioritize more effectively.
Abnormal's Crane Hassold and Stephen Doughtery of the Secret Service discuss how enterprises can stop BEC. Watch the recorded session from Vision 2023.
Discover more about the next generation of threats from some of the leading voices in cybersecurity. Get on-demand access to recordings from Vision 2023.
CISOs from Abnormal Security, Acrisure, & Archaea Energy explore how enterprises can protect against emerging threats. Watch the webinar from Vision 2023.
In this recorded session from Vision 2023, author, consultant, and convicted felon Frank Abagnale shares how organizations can reduce cybersecurity risks.
Hear from 3 cybersecurity experts on how to minimize your exposure and reduce your vulnerability to email-borne attacks in a cloud-based environment.
In this on-demand webinar, cybersecurity expert Ira Winkler explores risks to cloud email and shares what enterprises can do to block these attacks.
Discover how Abnormal provides better intelligence on blocked attacks, freeing time for Air Canada analysts to focus on other threats.
Discover key platform features and capabilities designed to ease the burden on your security team.
In this webinar, Abnormal CISO Mike Britton is joined by Theresa Payton, cybersecurity expert and the first female White House CIO, to discuss ransomware.
In this on-demand recording of our first “Abnormal Demo Day”, we explore key platform features and capabilities designed to address today’s toughest security challenges.
In this webinar, Abnormal CISO Mike Britton is joined by Troy Hunt, an expert in compromised credentials and the brains behind HaveIBeenPwned.com, to examine account takeover attacks.
Business email compromise (BEC) is no joke, and it continues to increase—despite increased awareness of the issue. Learn about the future of BEC attacks in this on-demand webinar.
In this on-demand webinar sponsored by Abnormal Security, you'll learn how cybercriminals execute email-based attacks and how your organization can strengthen your security posture to mitigate these threats.
Threat actors have shifted their strategy—moving away from internal impersonation and instead focusing on impersonating third parties. Watch the webinar to learn more about this new threat: financial supply chain compromise.
In this webinar, Graham Cluley, cybersecurity expert and host of the Smashing Security podcast, and Abnormal Security CISO Mike Britton discuss the latest in phishing attacks.
Secure email gateways (SEGs) focus on searching for known bad domains, attachments, and links. But threat actors have changed their tactics—opting to deceive humans instead of technology. It’s time for a modern solution to the email security problem, one that detects and prevents these attacks.
With the rise of modern attacks such as supply chain compromise, executive impersonation, and account takeover, it's become obvious: the SEG no longer works. Learn what you need for complete defense in depth protection.
Colonial Pipeline. CNA Financial. Quanta. Even the NBA. Hardly a week goes by without a ransomware story hitting the news, as organizations worldwide are targeted by an attack. But are there more dangerous threats out there?
Rachel Tobac talked to Abnormal Security's CISO Mike Britton about hacking, social engineering attacks, and how to protect your organization.
Ransomware has gotten a lot of attention in 2021, primarily due to the disruption attacks have caused to supply chains around the world. From Colonial Pipeline to Quanta, ransomware has made headlines and shows little sign of slowing down.
Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks.
Most people believe that the SOC is on the front lines, defending the castles against the forces of darkness. And while that’s true, it’s never quite as heroic as we’d like it to be.
Ransomware is a major problem, and it’s not going away. To understand it, we must understand why threat actors turn to it—and how it can be stopped. The best way to do that is to chat with the masterminds behind these attacks.
Legitimate email communications often contain links and attachments, and employees need to click on those links and attachments to do their jobs. Unfortunately, securing the enterprise often means stopping employees from doing so in an effort to stop bad actors from gaining access to systems or stealing money.
The emergence and evolution of advanced socially-engineered cyber attacks, including business email compromise, supply chain fraud, and ransomware, has organizations rethinking their security strategies and tech stacks.
Cybersecurity is largely a behavioral concern, as cybercriminals use social engineering to trick people into transferring money, entering their credentials, or providing access to sensitive data.
For cybercriminals, penetrating a healthcare organization is like striking gold. Provider and payer professionals have access to some of the highest-value data in the world, including patients’ personal details, medical histories, social security numbers, insurance information, and more.
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.
CISOs deal with a multitude of threats that can have significant financial and reputational impacts. Of those threats, business email compromise is the #1 attack type, costing businesses almost as much as all other cybersecurity incidents combined.
Ransomware is a major problem, and it’s not going away. To understand it, we must understand why threat actors turn to it—and how it can be stopped. The best way to do that is to chat with the masterminds behind these attacks.
Traditional cybersecurity infrastructure can’t stop new and emerging threats, particularly in the email channel, and cybercriminals are constantly changing their methods to stay one step ahead. Hear how Theresa Payton, first female White House CIO, thinks about these attacks.
While you may be confident in your own email security, the truth is that your security is only as good as the security of your partners and vendors. Discover why vendor email compromise is such an important part of your security strategy.