Uncovering the Next Generation of Email Threats: 3 Key Insights from Ira Winkler

In this on-demand webinar, cybersecurity expert Ira Winkler explores risks to cloud email and shares what enterprises can do to block these attacks.

Invoice fraud. Payroll diversion. Gift card requests. Fraudulent wire transfers. Malicious attachments. These types of attacks have dominated the cybersecurity space for the past few years, as security leaders worldwide attempt to find ways to stop increasingly-sophisticated inbound threats.

But what about those attacks that are circumventing your inbound email, yet still infiltrating your email environment? How do you stop the attacks that come through indirect channels? Or perhaps even more concerning: how do you even discover these attacks in the first place?

In this on-demand webinar, cybersecurity expert Ira Winkler:

  • Describes how the move to cloud email has opened your organization to a variety of new attacks that no longer come through inbound email

  • Provides real-world examples of these side-channel attacks that abuse third-party application access or result from legacy authentication exploitation

  • Gives insight into how these attacks can result in credential theft, stolen session cookies, and compromised accounts—without you ever being aware

  • Showcases how to better mitigate this risk with cloud email security designed to detect and prevent these attacks

Watch the webinar to learn about risks to cloud email environments and what enterprises can do to block these attacks.

After viewing this webinar, you are eligible for 1 CPE credit through (ISC)².

Uncovering the Next Generation of Email Threats: 3 Key Insights from Ira Winkler

Watch Now


See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
Integrates Insights Reporting 09 08 22

Related Resources

B 1 23 23 Demo D Ay
Tas Jalali, Head of Cybersecurity at AC Transit speaks with Abnormal about his security strategy for the new year.
Watch Now
B 01 12 23 ADT video 1
With Abnormal, ADT has a robust security solution that protects its employees from advanced email attacks.
Read More
B 1500x1500 Hospitality L1 R1
Threat actors target hospitality businesses to steal troves of personally identifiable information. Learn how Abnormal stops these attacks.
Read More
B 1500x1500 Transportation Industry L1 R1
Cybercriminals target the transportation industry to worsen supply chain strains or put the public at risk. Learn how Abnormal prevents these attacks.
Read More
B 1500x1500 Energy Industry L2 R1
Threat actors routinely target energy and infrastructure providers to disrupt critical operational technologies. Learn how Abnormal blocks these attacks.
Read More
B 1500x1500 Intelligent security summit webinar
Discover how security leaders are mitigating new internal threats and the best ways to protect your organization from these new attack opportunities.
Watch Now
B 1 19 23 Arch Capital OPT2
See why the Arch Insurance team considers Abnormal’s platform to be a highly effective, easy-to-use risk reduction solution.
Watch Now
B 1500x1500 Green Hill Case Study 12 09 22
With Abnormal protecting inboxes & enhancing incident response, investment banking firm Greenhill can focus on guiding clients through complex events.
Read More
B 11 30 22 EAB vid
With thousands of threats stopped, Abnormal has freed up EAB’s security team to focus on improving access to education rather than investigating and remediating email threats.
Read More