BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Cyber Insurance Academy - ECPv6.15.17.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.cyberinsuranceacademy.com
X-WR-CALDESC:Events for Cyber Insurance Academy
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20220101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20230523T180000
DTEND;TZID=UTC:20230523T190000
DTSTAMP:20260417T164746
CREATED:20230523T180001Z
LAST-MODIFIED:20250320T144312Z
UID:10001890-1684864800-1684868400@www.cyberinsuranceacademy.com
SUMMARY:Masterclass: Supporting Insureds With Email Security
DESCRIPTION:Supporting Insureds With Email Security\nCyber insurance professionals play a critical role in helping businesses understand and manage their cyber risks with email security. Understanding email security is therefore a critical aspect for all cyber insurance professionals. \n75% of organizations worldwide reported an attempted business email compromise (BEC) attack last year.\nCyber attackers often gain access to sensitive information\, such as financial data\, passwords\, and personal information\, through email security breaches. The consequences of a successful attack can be severe\, leading to reputational damage\, legal liability\, and financial loss for your clients. By having a strong grasp of email security trends and best practices\, cyber insurance professionals can evaluate their clients’ cyber hygiene posture and provide valuable guidance to help them select the appropriate insurance policy and vendor for their business. \nMasterclass Learning Objectives: Email Security\n\nIdentify & explain key trends relating to email security & BEC attacks.\nGive examples of best practices that your insureds should follow to mitigate the impact of attacks via emails; apply these to evaluate their cyber hygiene.\nExplain what a catch rate is\, how the cost of remaining risk is calculated and what these metrics can tell us about the efficiency of your insureds’ email security vendors.\n\nMasterclass Speakers:\nKeely Wilkins \nCybersecurity Evangelist with the Office of the CTO at Check Point Software Technologies \nKeely Wilkins has worked in the technology industry for over twenty-five years\, holding positions in Fortune 50\, Telco\, VAR\, and Higher Education organizations before joining Check Point in 2019. Keely is a Contributor to the “Partnership Against Cybercrime” working group with the World Economic Forum. She holds a Master of Science in Cybersecurity from Florida Tech and is currently studying toward a Master of Legal Studies specializing in Cybersecurity Law and Policy at Texas A&M University School of Law. Keely endeavors to find balance among transparency\, predictability\, and security. \n– \nAndrew Igel (CISSP\, CE|H\, Security+) \nLead Security Engineer at Check Point Software Technologies \nAndy Igel’s career in information security\, technology and compliance spans over twenty-five years and has included numerous positions in both the public and private sector. He is experienced in all sides of compliance and information security\, including technology\, policies\, and auditing. Andy will be providing a technical overview of software that can help to combat the issue of email security. \nAbout Check Point\nCheck Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry-leading catch rate of malware\, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony\, for remote users; Check Point CloudGuard\, to automatically secure clouds; and Check Point Quantum\, to protect network perimeters and datacenters\, all controlled by the industry’s most comprehensive\, intuitive unified security management; Check Point Horizon\, a prevention-first security operations suite. Check Point protects over 100\,000 organizations of all sizes. \n		\n					\n						\n					\n			\n						\n				\n							\n\n						\n				\n								\n			\n			\n						\n\n									\n						\n							Unlock more world-class knowledge and expertise.						\n					\n				\n				\n			\n			\n		\n						\n				\n				\n				\n									Upgrade your membership to enjoy unlimited access to premium content. 								\n				\n				\n				\n							\n			\n		\n						\n				\n				\n				\n									\n					\n						\n									Upgrade Membership\n					\n					\n				\n								\n				\n				\n				\n									Already have an account? 								\n				\n				\n				\n									\n					\n						\n									Sign in
URL:https://www.cyberinsuranceacademy.com/event/email-security-masterclass-supporting-insureds-with-the-1-attack-vector/
LOCATION:Online Event
CATEGORIES:Premium Events
ATTACH;FMTTYPE=image/png:https://www.cyberinsuranceacademy.com/wp-content/uploads/2024/06/Checkpoint-1-1.png
END:VEVENT
END:VCALENDAR