(ISC)2

More Events
Past EventsOn-Demand Events

Upcoming (ISC)2 Events

Stop Chasing Alerts: Automating Email Security with Behavioral AI Roundtable

Apr 9, 2026

Virtual / Online

(ISC)2
Phishing, business email compromise (BEC), and account takeover (ATO) remain some of the most disruptive and resource-draining security challenges for modern organizations. AI-generated attacks now convincingly mimic trusted colleagues, vendors, and partners, bypassing traditional defenses and landing directly in user inboxes. On April 9, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific, sponsor Abnormal AI and host ISC2 discuss how security teams can shift from reactive alert triage to automated, behavior-based defense.

They'll cover:
  • Why modern phishing, BEC, and ATO attacks evade traditional email security controls
  • The operational strain on SOC and IT teams, including alert fatigue and investigation backlogs
  • Practical ways behavioral AI can automate detection, investigation, and remediation
Join us to learn how to create a smarter, automated defense against modern email threats.
View all

Events We Are Sponsoring

Apr 14, 2026

Virtual / Online

As email attacks grow more sophisticated, legacy Secure Email Gateways (SEGs) are no longer enough. Social engineering, BEC, and AI-generated attacks continue to bypass traditional filters, creating costly breaches and alert fatigue for already resource-strapped security teams.

This forward-looking discussion will explore what a modern approach to email security requires, why behavioral data science is critical to closing the detection gap, and which capabilities define next-generation protection. Attendees will gain practical guidance on building a more adaptive, efficient, and resilient email defense strategy.

 Attendees will learn:
  • Why legacy SEGs increasingly fail against modern social engineering, BEC, and AI-crafted attacks—and what detection gaps matter most. 
  • How behavioral data science and identity-focused analysis strengthen detection accuracy while reducing false positives and alert fatigue.
  • Which capabilities define next-generation email security and how to build a more adaptive, efficient, and resilient defense strategy for today’s enterprise.
View all