Uncovering the Next Generation of Email Threats: 3 Key Insights from Ira Winkler

In this on-demand webinar, cybersecurity expert Ira Winkler explores risks to cloud email and shares what enterprises can do to block these attacks.

Invoice fraud. Payroll diversion. Gift card requests. Fraudulent wire transfers. Malicious attachments. These types of attacks have dominated the cybersecurity space for the past few years, as security leaders worldwide attempt to find ways to stop increasingly-sophisticated inbound threats.

But what about those attacks that are circumventing your inbound email, yet still infiltrating your email environment? How do you stop the attacks that come through indirect channels? Or perhaps even more concerning: how do you even discover these attacks in the first place?

In this on-demand webinar, cybersecurity expert Ira Winkler:

  • Describes how the move to cloud email has opened your organization to a variety of new attacks that no longer come through inbound email

  • Provides real-world examples of these side-channel attacks that abuse third-party application access or result from legacy authentication exploitation

  • Gives insight into how these attacks can result in credential theft, stolen session cookies, and compromised accounts—without you ever being aware

  • Showcases how to better mitigate this risk with cloud email security designed to detect and prevent these attacks

Watch the webinar to learn about risks to cloud email environments and what enterprises can do to block these attacks.

After viewing this webinar, you are eligible for 1 CPE credit through (ISC)².

Uncovering the Next Generation of Email Threats: 3 Key Insights from Ira Winkler

Watch Now


See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
Integrates Insights Reporting 09 08 22

Related Resources

See how NFP moved beyond the limitations of the SEG to simplify and improve their email security.
Watch Now
B 5 15 23 Saskatoon PS
Saskatchewan’s largest school division uses Abnormal to detect and auto-remediate advanced attacks, reclaim time, and save money.
Read More
B CISO Fireside Chat OD Webinar
Cybersecurity leaders from Rubrik, Noname, Wiz, and Abnormal Security share their experiences and insights in this on-demand CISO fireside chat.
Watch Now
B 1500x1500 Rubicon Case Study L1 R1
Abnormal has eliminated the waste of reviewing copious email alerts and false positives, allowing the Rubicon team to focus on more strategic initiatives.
Read More
B TAG Cyber Buyers Guide
Download the buyer's guide for valuable advice on effectively securing cloud email environments and choosing the right cloud email security solutions provider.
Download Now
B Video Redefining Cloud Email Security
Abnormal's Head of Marketing, Arun Singh, explores the new solutions and strategies needed for the detection of and defense against advanced email attacks.
Watch Now
B 1 05 22 VBCPS
With a small team, complex challenges, & limited resources, Virginia Beach City Public Schools needed better security tools. Learn why they chose Abnormal.
Read More
B 04 20 23 Gartner report
Abnormal’s fundamentally different approach to cloud email security provides the best protection against existing and emerging attack techniques.
Read More
B Securing Cloud Email Video
Abnormal Security's CISO, Mike Britton, shares how enterprises can protect their cloud email environments from inbound attacks and email platform attacks.
Watch Now