Dots Header Light


Find out more about our upcoming virtual events, tradeshow appearances, and sponsorship gatherings, or watch one of our on-demand webinars on a range of cybersecurity topics.


Securingfinancial 2019Outlinedsb Version 2
Jan 26, 2023
Securing Financial Services 2023

We are attending the Securing Financial Services 2023 in-person event in London. We're also hosting a session on the day discussing 'The Changing Email Threat Landscape'- don't miss it!

STLF 2017
Jan 26, 2023
Securing the Law Firm 2023

Join us in London for Securing the Law Firm 2023 to discuss the benefits of our integrated cloud email security platform. Don't miss our presentation either!

Privsec Logo
Jan 26, 2023
PrivSec: Last Thursday in Privacy

As part of Data Privacy Week, PrivSec are hosting the 'Last Thursday in Privacy' event giving insights into global challenges and opportunities. Join Jack Chapman, Egress' VP of Threat Intelligence, for a panel session on the day titled 'Insider Threats: If Prevention is Impossible, How Can Companies Avoid and Fortify?'

Techforge Logo
March 9, 2023
Techforge webinar: Email security in 2023- threat trends, attack examples, and how to enhance your defenses in Microsoft 36

Research shows that almost every organization have had email security incidents in the last 12 months. As a result, enhancing email security in Microsoft 365 is a top priority for CISOs globally.

Eventcard 2023Amspringsummit
Mar 19 - 22, 2023
FS-ISAC Americas Spring Summit

If you're a current FS-ISAC member, join us at the Americas Spring Summit in Denver, CO.

Digital Healthcare Show Resource Tile 375X250
Apr 23 - 24, 2023
Digital Healthcare Show 2023

Join us at this year's Digital Healthcare Show for two days of exceptional educational content, cutting-edge case studies, and inspiring insight on the cybersecurity space.

RSAC 2022 Egress Team Article2 (1)
Apr 24 - 27, 2023
RSA Conference 2023

We can't wait to see you at RSAC 2023! Talk with the Egress team on booth 5628.

British Legal Tech Forum 2023 Extra Space Version
May 10, 2023
British Legal Technology Forum

Catch up with the Egress team on booth A01 and don't miss our presentation on the Egress Main Stage.

Infosec Europe Egress Booth 2022 (1)
Jun 20 - 22, 2023
Infosecurity Europe 2023

Make sure you join the Egress team on booth P50 to discuss the benefits our integrated cloud email security platform.

Security IT Summit Logo
June 27, 2023
Security IT Summit

A highly focused event that brings together delegates and suppliers, the summit consists of one-to-one business meetings, interactive seminars and valuable networking opportunities. Join Egress there to discuss the benefits our integrated cloud email security platform.

Black Hat 2
Aug 9 - 10, 2023
Black Hat USA 2023

Join the Egress team on booth 2852 to talk about our integrated cloud email security.

On demand

HAR Heroimg Tradeshow Thumbnail V3
Human Activated Risk Summit

Cut through the hype on key topics, including AI, defense in depth, and security awareness training.

Today’s email threat landscape and why security is failing you

There may be a few reasons why your security is failing you and your company. This webinar will feature two industry experts from Egress

1343 Case Study Webpage Headers DESKTOP 1920X850 Batch 1 Family Law
Levelling up Your Law Firm Against Advanced Phishing Threats

88% of law firms have suffered phishing attacks that led to credential theft, client and corporate data exfiltration, systems being infected with malware and ransomware, and financial losses from fraudulent activity.

Top Ransomware Attacks 555X300
The personal impact of a ransomware attack

In this talk, we will look at the real-world reality of a ransomware attack and how it is the humans you employ who can make this a success or a failure to be cited in infosec talks forever more.

Insurance Money 600X400 33Kb
Cyber insurance: Lessons learned from post-breach reality

In this session, Megan Ryan, Hiscox Insurance, will share her insights into cyber insurance and remediation trends, particularly how they’ve seen post-breach reality differ to original expectations.

Training 555X300
Leapfrog from SA&T compliance-as-a-strategy, to actual behavior & culture change

Security remains plagued with the legacy of compliance-driven, security awareness & training tools and methods. As more transformational security and tech leaders and vendors realize the importance of the human element, and the ineffectiveness of how we are addressing human related challenges, we will start to move towards behavior and culture change. 

Artificial Intelligence Help 600X400 34Kb
Cutting through the hype of artificial intelligence in cyber security

Join this session to gain an insight into the common AI technologies used in cyber and the questions your need to ask the vendors touting them.

AI 600X400 41kb
The Security of Artificial Intelligence

 Like any technology, AI presents an attack surface, so you need to understand it to understand the risk associated with it.

Cybersecurity Data 365X325 36Kb
Is the cyber security industry selling snake oil?

The cyber security industry is a hotbed of start-ups bringing technologies to market that solve the complex problems created by the rapidly evolving threat landscape.

Hacker Toolkit 590X300 46Kb
Turning a Hacker’s Toolkit Against Them

Toolkits make a hacker’s life easy and democratize cybercrime. These kits are constantly evolving, but it is imperative that defenders understand how they work so that they can create defenses to protect their organization.

Keeping pace with emerging threats

In this timely session, Egress' Cyber Intelligence Analyst, Ben du Parc Braham, offers advice on how to keep up to date with the threat landscape.

Intelligent email security lady typing in office
SANS Protects: Prevalent Threats to Enterprise Email

In this webcast, Egress' VP of Threat Intelligence Jack Chapman is joined by other cybersecurity experts to discuss prevalent threats to enterprise email, how adversaries abuse them, and steps your organization can take to mitigate these threats.

Cyber Threat 365X195
Insider Threats: Detecting and Mitigating the Threat From Within

Egress' VP of Product, Steve Malone joins this discussion, where the panel explores how organizations can detect insider threats and offer advice on the steps businesses can take to protect employees, customers, and their overall brand.

Ransomware Hack 396X264 24Kb
Best Practices for Detecting, Preventing and Recovering from Ransomware

Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted.

The Human Element: fixing the behaviors that lead to breaches

Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.

Whitepapers Insider Report 2020 555X300
Inside job - investigating the malicious insider threat

Insider risk is the most complex cybersecurity issue to solve, why are malicious insiders the biggest concern? According to IT leaders, it's not simply the bad taste left by a formerly trusted colleague turning rogue and deliberately doing harm. 

Working Laptop Human 600X400 38Kb
How to reduce human activated risk

Human activated risk is introduced into organisations by sophisticated phishing attacks, human error and malicious insiders. To reduce this risk, organisations are adopting new defences which engage and empower users to help them become part of the solution.

Data Privacy and the Evolution of Client Phishing Attacks

This roundtable discussion brings together key players within the sector on how to mitigate the loss of client information as well as breaking down the elements of risk.

Preventphishemail 600x400 316kb
View from the top: How to empower people to stop phishing attacks

Watch our recent webinar for actionable insights on stopping inbound email attacks and empowering employees to become security advocates

Legal Industry
Why your law firm needs to layer your email security in Microsoft 365 for maximum protection

While Microsoft 365 is the world’s go-to productivity platform, its native functionality can’t stop all outbound email data breaches. As a cybersecurity professional, it is crucial to examine the next layer to your email security defense.

Why ransomware is a global threat to your organization

Email phishing is the primary method for criminals to deliver ransomware, and it's estimated that this is how 94% of attacks are delivered. Being able to stop the delivery of ransomware is the key to breaking the kill chain and stopping it for good. 

Healthcare Industry
Private Healthcare: Why you need intelligent email security

Email is a vital communication tool for organizations globally but email is also the top security risk for healthcare providers as employees accidentally leak data everyday.

Datasheets Intelligent Email Schools 555X300
Expert insight: How to prevent email data loss without disrupting business

This exposes organizations to a wide range of risk caused by human error. In fact, IT leaders in the healthcare industry reported there has been a 46% increase in data loss via email since remote working began. This exposes organizations to a wide range of risk caused by human error. In fact, IT leaders in the healthcare industry reported there has been a 46% increase in data loss via email since remote working began.

Business People Looking At Graph Stats Risk Istock 985884916
Threats of the future: Predicting and mitigating the next wave of insider risk

Insider risk is an ever-changing paradigm, with organisations needing to predict and adapt to emerging threats. In this session, we’ll examine the insider threat landscape and the future direction of risk, providing practical advice and guidance for mitigation strategies.

Hands Laptop Email Security 555X300 44Kb
Data-driven security: Using machine learning in the battle against breaches

Static DLP technologies and have failed to stop insider data breaches because they’re unable to anticipate that people’s behaviour changes and detect when it does. Instead, organisations are implementing intelligent technologies, including contextual machine learning, to empower people to work productively without risk. 

Insiderthreat 600x400 360kb
Panel discussion: The impacts of insider data breaches

From damage to client relationship and remediation efforts, to talent retention, the impacts of insider data breaches are felt organisation-wide. In this panel session, security leaders will analyse the true impacts of insider breaches and offer guidance on how to handle them.

Hlsglobal Apr2021 Website555x300
Human Layer Security Global

Join Human Layer Security Global to hear from industry thought leaders and top brands about how this changes insider risk and what you need to do to keep sensitive data secure now and for the future.

City London Finance 555X300
Trading on trust: How Harneys are using email security to protect client data and revenue generation

Join this webinar to hear Mike Duff, CSO at Harneys, discuss the pivotal role of email for law firms during the pandemic and the security risks this has created.

Datasheets Webform 555X300
How you can prevent data loss and maintain compliance in your email system with Virgin Money

Hear from Tony Pepper, CEO, Egress and Kathryn Cardose, Head of Cyber Operations at Virgin Money as they discuss the risks that enterprises face from email, and the strategies you should be taking to prevent security incidents.

Expert insight: Email security for investment management firms

In this webinar, Rachel Wilson, Head of Cybersecurity for Morgan Stanley, will join Egress in conversation about the key considerations for email security to support employees - wherever they're based and whatever device they're using! 

Why Box Security And Control 600X400
Under pressure! Satisfying Regulatory and Client Security Demands

This live virtual roundtable will explore the balancing of regulatory and client security demands and the critical role that technology offers. Speakers will offer insight into maintaining operational efficiency, whilst striving to achieve and ensure the primary goal of excellent client service delivery.

Law 600x400 195kb
Preventing Email Errors From Leading to Lawsuits

Data breach litigation is the new PPI – and outbound email is revolving door for claims! We’re moving into a new era of data protection: with class action lawsuits becoming an inevitable and costly outcome of almost every data breach. 

Doctor Healthcare Worker Tablet 358X193
The Healthcare & Pharma Breach – Who’s the more prominent target, the patient or the company?

Healthcare organizations are a desirable target for cybercriminals looking to exfiltrate patient data, defraud providers of funds, or even cause civil disruption by using malware and ransomware to interrupt daily operations.

Whitepapers Hipaa Healthcare 380X205 13Kb
Protecting patient data with Intelligent Email Security at CSN Care

Join this webinar to hear Sathees Kanna, Head of Information Technology at CSN Care, in conversation with Mark Lendon, Senior VP of Sales at Egress. Together, they’ll discuss the email-borne threats organisations face, why and how people put sensitive data at risk, and how intelligent security that uses contextual machine learning can prevent email breaches and protect patient data.

A Growing Trend: Class Action Cases

Class actions are on the rise with high profile organisations Oracle and Salesforce hit with GDPR class action lawsuits over the use of third-party cookies for ad tracking and targeting across several countries. With more EU citizens taking legal action, this could spread across the globe. This panel will explore this growing trend and predictions for 2021 and beyond.

Embracing intelligent email security at Robert Walters Group

Watch this webinar to hear how leading recruitment agency Robert Walters Group has taken a new approach to tackling this insider risk with Egress Intelligent Email Security alongside sep2’s cybersecurity expertise.

email dlp laptop phone 600x400 24kb
The failures of static DLP and how to protect against tomorrow's email breaches

 It is not an understatement to say that legacy email DLP technologies have failed you. In response, you need to understand how advances in intelligent technology can keep confidential and proprietary information safe on email.

Eu Flag Gdpr 600X400
Safeguarding customer confidence: Taking email security beyond GDPR at Envision Pharma Group

Hear from Paul Wilkins, Global Head of IT at Envision Pharma, and Rebecca Bailey, Senior Corporate Marketing Manager at Egress as they discuss the inherent risks caused by people using email, limitations in legacy approaches, and the role of intelligent technology that uses contextual machine learning to mitigate security breaches.

Finance 555X300
Intelligent email security and advanced DLP in financial services

Hear FDC Data Protection Lead Jessica Perrott and Egress Senior Product Marketing Manager Fahim Afghan as they assess the real-world risk of email data breaches in financial services, and examine the role technology plays to mitigate this risk and keep proprietary data safe.

Merthyr Tydfil Customer Story (1)
Preventing email data breaches in UK local authorities – Merthyr Tydfil County Borough Council case study

Hear Egress customer Ryan James, Information Security Lead at Merthyr Tydfil, and Egress Chief Product Officer Sudeep Venkatesh as together they explore the changing risks to sensitive data in UK local authorities and the urgent requirement for intelligent email security to mitigate threats.

1343 Case Study Webpage Headers DESKTOP 1920X850 Batch 1 BDO
Embracing intelligent email security at BDO

Join BDO’s Chief Digital Officer Phil Ruelle and Data Protection Officer Melissa Pardoe as they assess the risk of email data breaches in financial services, explain how to build a business case for intelligent email security, and offer advice ensuring these efforts are more than a box-ticking exercise by integrating technology with existing policy requirements.