(ISC)2

More Events
Upcoming (ISC)2 Events

Phishing, business email compromise (BEC), and account takeover (ATO) remain some of the most disruptive and resource-draining security challenges for modern organizations. AI-generated attacks now convincingly mimic trusted colleagues, vendors, and partners, bypassing traditional defenses and landing directly in user inboxes.
On April 9, 2026 at 1:00 p.m. Eastern/10:00 a.m. Pacific, sponsor Abnormal AI and host ISC2 discuss how security teams can shift from reactive alert triage to automated, behavior-based defense.
They'll cover:
They'll cover:
- Why modern phishing, BEC, and ATO attacks evade traditional email security controls
- The operational strain on SOC and IT teams, including alert fatigue and investigation backlogs
- Practical ways behavioral AI can automate detection, investigation, and remediation
Events We Are Sponsoring

As email attacks grow more sophisticated, legacy Secure Email Gateways (SEGs) are no longer enough. Social engineering, BEC, and AI-generated attacks continue to bypass traditional filters, creating costly breaches and alert fatigue for already resource-strapped security teams.
This forward-looking discussion will explore what a modern approach to email security requires, why behavioral data science is critical to closing the detection gap, and which capabilities define next-generation protection. Attendees will gain practical guidance on building a more adaptive, efficient, and resilient email defense strategy.
Attendees will learn:
This forward-looking discussion will explore what a modern approach to email security requires, why behavioral data science is critical to closing the detection gap, and which capabilities define next-generation protection. Attendees will gain practical guidance on building a more adaptive, efficient, and resilient email defense strategy.
Attendees will learn:
- Why legacy SEGs increasingly fail against modern social engineering, BEC, and AI-crafted attacks—and what detection gaps matter most.
- How behavioral data science and identity-focused analysis strengthen detection accuracy while reducing false positives and alert fatigue.
- Which capabilities define next-generation email security and how to build a more adaptive, efficient, and resilient defense strategy for today’s enterprise.