For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Tackling the No. 1 corporate vulnerability used as an exploit: Email

Tackling the No. 1 corporate vulnerability used as an exploit: Email
On Demand
  • Recorded Date:Nov. 17, 2020
  • Event:On Demand
Tackling the No. 1 corporate vulnerability used as an exploit: Email

With email being the world’s No. 1 most common exploitation method, system administrators and architects need to understand the scope of the problem. In this session, we will examine the fundamental reasons why email is such a problem in the current security landscape, common exploit methods within cloud or hybrid environments, and what we can do within Office 365 to help protect ourselves and the organizations for which we work.