Floor dark green 1 FINAL

Ransomware and BEC in the Cyber Threat Landscape: Past vs. Present, Perception vs. Reality

Colonial Pipeline. CNA Financial. Quanta. Even the NBA. Hardly a week goes by without a ransomware story hitting the news, as organizations worldwide are targeted by an attack. But are there more dangerous threats out there?

Colonial Pipeline. CNA Financial. Quanta. Even the NBA. Hardly a week goes by without a ransomware story hitting the news, as organizations worldwide are targeted by an attack. But are there more dangerous threats out there?

In this webinar, hear Crane Hassold, Director of Threat Intelligence at Abnormal Security, discuss the real threats in today’s landscape, and why ransomware is only one of your concerns. With full insight into the past, present, and future of the threat landscape, this webinar will provide you everything you need to understand what could be targeting your organization.

Watch this on-demand webinar to learn:

  • How has the cyber threat landscape changed over the past decade?
  • What drives threat actors to change their methods and tactics?
  • Why should stopping business email compromise be at the top of your priority list?
  • And what will change as new regulations are put in place?

Complete the form to watch the recording.

After viewing this webinar, you are eligible for 1 CPE credit through (ISC)².

Watch Now

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Resources

Webinar hacking tobac cover
Rachel Tobac talked to Abnormal Security's CISO Mike Britton about hacking, social engineering attacks, and how to protect your organization.
Watch Now
Webinar beyond spam cover
Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks.
Watch Now
Webinar cover 4
CISOs deal with a multitude of threats that can have significant financial and reputational impacts. Of those threats, business email compromise is the #1 attack type, costing businesses almost as much as all other cybersecurity incidents combined.
Watch Now
Webinar cover 1
Traditional cybersecurity infrastructure can’t stop new and emerging threats, particularly in the email channel, and cybercriminals are constantly changing their methods to stay one step ahead. Hear how Theresa Payton, first female White House CIO, thinks about these attacks.
Watch Now
Threat report 2
Attackers are leveraging social engineering to drive significantly higher engagement and account takeover. In the Q2 2021 threat report, Abnormal found that attacks are growing at significant rates, as threat actors leverage social engineering strategies to bypass SEGs and drive engagement.
Download Now
Threat report 1
Cybercriminals upped their game over the last quarter—increasing the number of credential phishing attacks and account takeover attempts. In our quarterly threat report, Abnormal Security discovered significant increases in the number of brute force attacks and impersonation attempts.
Download Now
Resource 02 CISO
Business email compromise (BEC) is the most significant cybersecurity threat to enterprise organizations, with $1.8 billion lost in 2020 alone. This type of email attack occurs when a cybercriminal uses social engineering to impersonate a trusted contact—typically an executive, coworker, vendor, or partner.
Download Now