For organizations that use Microsoft 365, it’s a cornerstone of their business. Users rely on it to log in, receive and send email, and store and share sensitive data.
Microsoft 365 is also the most targeted software for cyberattacks, according to Statista.
These factors alone make Microsoft 365 a critical piece of technology to monitor. Adversaries tend to reuse techniques, tactics and procedures (TTPs) to launch their attacks — and there are some common Microsoft 365 attacks that you’ll want to watch out for. You’ll learn:
- How to detect threat actors’ favorite techniques for Microsoft 365 attacks
- Why Microsoft 365’s built-in security settings aren’t enough protection
- Easy ways to protect yourself against the rise in Microsoft 365 attacks
This interactive, conversational-style session encourages questions and engagement with viewers – so sign up today for access to our security experts.
Participants
Matthew Warner, CTO and Co-Founder, Blumira
Matt is CTO and Co-Founder of Blumira, a leading cybersecurity provider of automated threat detection and response technology. At Blumira, he leads the security and engineering efforts to provide actionable insights into cybersecurity risks at scale. Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.
Erica Mixon
Erica is an award-winning writer, editor and journalist with over ten years of experience in the digital publishing industry. She holds a Bachelor’s degree in writing, literature and publishing from Emerson College. Her foray into technology began at TechTarget, where she provided editorial coverage on a wide variety...
More from the blog
View All PostsCustomer Story: Girl Scouts of Southeastern Michigan
Read MoreCustomer Story: Mid-Sized Manufacturing Firm
Read MoreDetect and Respond to Azure Threats With Blumira: Easy Cloud SIEM Setup
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.