BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.brighttalk.com/webcast/18851/667409
DTSTAMP:20260426T183440Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.brighttalk.com/webcast/18851/667409?utm_campaign=commu
 nication_reminder_starting_now_registrants&utm_medium=calendar&utm_sou
 rce=brighttalk-transact
DTSTART:20260520T090000Z
DTEND:20260520T092703Z
SUMMARY:Live webcast: Phishing 2.0: Duo Passcodes Under Siege
DESCRIPTION:Click here to attend: https://www.brighttalk.com/webcast/1
 8851/667409?utm_campaign=communication_reminder_starting_now_registran
 ts&utm_medium=calendar&utm_source=brighttalk-transact\n\nPresenter: Je
 sus Garcia, Solutions Architect, Abnormal AI\n\nPhishing campaigns tar
 geting the education sector are evolving—leveraging compromised accoun
 ts and real-time credential harvesting to bypass traditional defenses.
  Join Jesus Garcia, Solutions Architect at Abnormal AI, as he breaks d
 own how attackers exploit spoofed authentication portals to capture Du
 o passcodes and execute account takeovers at scale. With over 40 organ
 izations impacted—primarily in SLED—these attacks are timed to maximiz
 e disruption during high-pressure academic periods. \n\nLearn why lega
 cy secure email gateways fail to detect internally generated threats a
 nd how a behavioral, AI-driven approach can identify anomalies, stop l
 ateral phishing, and automate response. Discover how Abnormal enables 
 organizations to detect, contain, and remediate account takeover attac
 ks before they escalate.\n\nJoin our session and learn:\n- How attacke
 rs use real-time phishing to bypass MFA and compromise accounts\n- Why
  internal, account-based attacks evade traditional email security tool
 s\n- How behavioral AI and automation stop account takeovers and later
 al spread\n\nRegister now to protect your organization from advanced p
 hishing and account takeover attacks.
SEQUENCE:1779266841
END:VEVENT
END:VCALENDAR
