Protecting your Organization Against Phishing Attacks

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

There are increased instances of cyber-criminals developing new and sophisticated techniques for the sole purpose of duping users and extorting money or information, and many of these are common phishing techniques founded on impersonation, or fake sender identity.

Whether it is emails from “the World Health Organization” urging you to take action, or an email from “your CEO” asking for gift cards or donations, fraudsters prey on empathy, sympathy, and humans’ tendency to act and react.
In this webinar, we will look at how phishing attacks can be detected and prevented, and how to focus your defenses on a sender identity approach.
Key takeaways:

  • The nuances of “automated phishing” 
  • Why user awareness training isn’t enough to defend your organization and prevent losses
  • How authenticating “whom” is sending is the key to defining email security policies and protecting your organization
  • Defending against phishing and Business Email Compromise (BEC) attacks


David Appelbaum

CMO, Valimail

    Peter Cassidy

    Co-founder and secretary general of the APWG

      Ed Tucker

      CISO, co founder of Email Auth, Byte and Human Firewall

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.