Uncovering the Threat Potential of the Insider Breaches Using Real-World Email-Based Examples and Techniques

Free webinar

Immediate access

In association with:

Speakers include:

Sudeep Venkatesh, Chief Product Officer, Egress

Nick Cavalancia,  Microsoft MVP and cybersecurity expert, UltimateITSecurity.com

What you'll learn

The user’s Inbox has become a key part of just about every kind of security threat to organizations. Whether it’s an inbound phishing attack, a malicious insider exfiltrating data, or just a user choosing the wrong recipient name when emailing sensitive data, email – and the user’s interaction with it – plays a pivotal role in enabling these threats.

In this real-training-for-free session, Microsoft MVP and cybersecurity expert Nick Cavalancia takes my seat in this webcast, where he’ll take a look at some of the ways the combination of your user and their Inbox put the organization at risk, including: business email compromise (BEC), vendor email compromise (VEC), impersonation attacks, and user negligence.


Business Email Compromise (BEC) & Vendor Email  Compromise (VEC)


Impersonation attacks


User Negligence



He’ll walk through each and provide real-world examples of how these attacks take advantage of the accidental insider and put your organization at risk.

Sudeep Venkatesh, Chief Product Officer at Egress will also offer up some insight into the human behaviors and psychology behind various insider breach use cases, providing ways to quickly identify them and the role technology plays in mitigating it, including:


Accidental email sends


Malicious data exfiltration


Accidental data loss


Spear phishing