Scroll down for more information

Live Webinar Events

  • Wednesday
    February 01, 2017

    Email Security: Why It Probably Isn’t Working, and What To Do (European Broadcast)

    Wednesday, February 1

    15:00 GMT/16:00 CET

    Join Michael Osterman of Osterman Research as he shares the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.

    Webinar registrants will receive a free copy of the Osterman paper, and participants will come away from the webinar with new insights and ideas, including a sense of:

    • What percentage of executives are getting spear-phished or “whaled”?
    • In what areas have email security solutions improved, and in what aspects are they falling further behind?
    • How has the criminal “cybermarket” has evolved, and why is this driving a new focus on stealing funds directly?
    • What are best practices to reduce security risk associated with Bring Your Own Device policies?
    • Is employee training effective, and, if so, what kind works best?
    • How much did companies spend on security in 2016, and what are their plans for 2017?
    Register Now
  • Wednesday
    January 18, 2017

    Email Security: Why It Probably Isn’t Working, and What To Do (U.S. Broadcast)

    Wednesday, January 18

    2:00 PM ET/11:00 AM PT

    Join Michael Osterman of Osterman Research as he shares the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.

    Webinar registrants will receive a free copy of the Osterman paper, and participants will come away from the webinar with new insights and ideas, including a sense of:

    • What percentage of executives are getting spear-phished or “whaled”?
    • In what areas have email security solutions improved, and in what aspects are they falling further behind?
    • How has the criminal “cybermarket” evolved, and why is this driving a new focus on stealing funds directly?
    • What are best practices to reduce security risks associated with Bring Your Own Device policies?
    • Is employee training effective, and, if so, what kind works best?
    • How much did companies spend on security in 2016, and what are their plans for 2017?
    Register Now
  • On-demand Webinars

    View our on-demand webinars to learn more about Cyren Internet security solutions and industry trends, along with how Cyren can help your organization enhance and differentiate your security offerings.

  • December 07, 2016

    BOTNETS: THE CLONE ARMIES OF CYBERCRIME

    More details
  • November 15, 2016

    HOW HACKERS ARE MAKING YOUR SECURITY OBSOLETE WITH HYPER-EVASIVE MALWARE

    More details
  • October 04, 2016

    10 STEPS YOU CAN TAKE TO PROTECT YOUR BUSINESS FROM PHISHING ATTACKS

    More details
  • August 24, 2016

    A DEEP DIVE ON PHISHING, TODAY’S #1 BUSINESS THREAT

    More details
  • July 20, 2016

    IT SECURITY AT SMBS: 2016 BENCHMARKING SURVEY

    More details
  • June 28, 2016

    WHY EVASIVE ZERO-DAY ATTACKS ARE KILLING TRADITIONAL SANDBOXING

    More details
  • June 16, 2016

    STOPPING EVASIVE MALWARE: HOW A CLOUD SANDBOX ARRAY WORKS

    More details
  • May 17, 2016

    A DEEP DIVE ON RANSOMWARE WITH THE CYREN SECURITY TEAM

    More details
  • April 20, 2016

    CONFRONTING THE RANSOMWARE CRISIS: BEST PRACTICES FOR SECURING YOUR BUSINESS

    More details
  • March 23, 2016

    INSIGHTS FROM CYREN'S 2016 CYBERTHREAT REPORT

    More details
  • February 17, 2016

    IS YOUR WEB SECURITY BROKEN? 10 THINGS YOU NEED TO KNOW

    More details
  • December 09, 2015

    DEPLOYING CLOUD-BASED WEB SECURITY AS YOUR FIRST/LAST LINE OF DEFENSE

    More details
  • November 04, 2015

    PREVIEW THE FINDINGS FROM CYREN'S NEWEST CYBER THREATS REPORTINSIGHTS FROM CYREN'S 2015 Q3 CYBER THREATS REPORT

    More details
  • October 06, 2015

    NETWORK WORLD SURVEY RESULTS: QUICKPULSE RESEARCH ON WEB SECURITY

    More details
  • September 02, 2015

    DISPELLING THE MYTHS ABOUT CLOUD SECURITY

    More details
  • August 05, 2015

    INSIGHTS FROM CYREN'S 2015 Q2 CYBER THREATS REPORT

    More details
  • June 18, 2015

    EFFECTIVE CYBER SECURITY FOR HEALTHCARE

    More details
  • June 16, 2015

    EXPLORING INTERNET SECURITY FOR TODAY'S CYBER THREATS LANDSCAPE

    More details
  • May 06, 2015

    INSIGHTS FROM CYREN'S 2015 Q1 CYBER THREATS REPORT

    More details
  • March 03, 2015

    INSIGHTS FROM CYREN'S 2015 CYBER THREATS YEARBOOK

    More details
  • February 26, 2015

    THAT'S THE WAY THE NETWORK PERIMETER CRUMBLES: WEB SECURITY FOR THE NEW TECHNOLOGY PARADIGM

    More details
  • January 28, 2015

    CAN A LIGHT BULB REALLY POSE A SECURITY THREAT? A PRACTICAL LOOK AT INTERNET OF THINGS AND CYBERSECURITY

    More details
  • December 09, 2014

    IS THERE A BLIND SPOT IN YOUR CYBERCRIME VISION? ADD A THREAT DATA FEED FOR 20/20 RESULTS.

    More details
  • October 28, 2014

    INTERNET THREATS SERIES WEBINAR: INSIGHTS FROM CYREN'S NEW Q3 TREND REPORT

    More details
  • September 18, 2014

    HOW TO LAUNCH A CLOUD-BASED WEB SECURITY SERVICE IN AN HOUR

    More details
  • September 17, 2014

    IS YOUR AV/AS SOLUTION AN ARMY OF ONE? USING LAYERED SECURITY TO BATTLE CYBERCRIME

    More details
  • July 23, 2014

    INTERNET THREATS SERIES WEBINAR: INSIGHTS FROM CYREN's NEW Q2 TREND REPORT

    More details
  • June 24, 2014

    CHANNELCAST WEBINAR: CLOUD SECURITY FOR THE NEW MOBILE WORKFORCE REALITY

    More details
  • May 28, 2014

    DON'T RISK THE BLACKLIST: STOP OUTBOUND ANTISPAM

    More details
  • April 29, 2014

    INTERNET THREATS WEBINAR: INSIGHTS FROM CYREN'S SECURITY YEARBOOK & NEW Q1 TREND REPORT

    More details
  • January 28, 2014

    WEB FILTERING WEBINAR: PROVIDING THE BEST USER EXPERIENCE

    More details