A video series of short interviews with leaders and experts on prominent issues and emerging threats across our industry.
Do you havea topic or potential guest for our next edition of M3AAWG 5? Reach out via our Contact Us form (https://www.m3aawg.org/contact-us) to submit your suggestions.
M3AAWG 5 Episode 11 : EU’s NIS2 Brings Stronger WHOIS Data to Fight Online AbuseNovember 11, 2024 In the latest M3AAWG5 video, our panel dives into the EU's NIS2 Directive, particularly Article 28, which addresses concerns around redacted WHOIS records. M3AAWG5 is a series that brings together international cybersecurity experts to discuss pressing topics |
|||
M3AAWG 5 Episode 10 : SMS BEC PREVENTION PART 2: MFA ABUSE AND VULNERABILITIESFebruary 08, 2023 Multi-factor authentication (MFA) finally is having a moment, as both users and organizations work to fight rampant online abuse and fraud. In our latest M3AAWG 5 series, member experts and co-chair for M3AAWG Technical committee address this issue and provide some best practices and recommendations to identifying and preventing SMS-based business email compromise and benefits of MFA. |
|||
M3AAWG 5 Episode 9 : Understanding and Preventing SMS-based Business Email Compromise (BEC)February 02, 2022 Business email compromise, or BEC, has become an increasingly dangerous and widely used tool for an adversary to get access to a business email account to spoof the identity of an employee. Learn more about these attacks and recommendations for mitigation in our ninth episode of M3AAWG 5. |
|||
M3AAWG 5 Episode 8 : Mitigating Online AbuseSeptember 20, 2021 In the eighth episode of M3AAWG 5, we continued the discussion on mitigating online abuse and what we have learned along the way! |
|||
M3AAWG 5 Episode 7: Threat HuntingJuly 28, 2021 Today, we're joined by Herb Roitblat Ph.D., Principal Data Scientist for Mimecast. Herb spent the first part of his career working on topics ranging from biosonar to neural networks while a professor at University of Hawaii. He is also the author of "Algorithms Are Not Enough: Creating General Artificial Intelligence". |
|||
M3AAWG 5 Episode 6: The Path Forward for IoT SecurityMay 24, 2021 Together, Brian and Ash have over 35 years of experience in the IT and Networking security space, and have led industry-wide online anti-abuse collaboration on a wide range of security challenges – both inside and outside of M3AAWG. |
|||
M3AAWG 5 Episode 5: THE LATEST ON EU AND IRISH REGULATIONS WITH SENATOR ALICE-MARY HIGGINSMay 04, 2021 Today, we’re pleased to be joined by Senator Alice-Mary Higgins. Senator Higgins has over two decades of experience in policy, strategy and advocacy across the areas of equality, international development and social inclusion. |
|||
M3AAWG 5 Episode 4 - THE WORK OF M3AAWG'S ABUSE DESK COMMITTEEApril 01, 2021 In today’s episode, I sit down with Mickey Chandler, Abuse Desk Committee Co-Chair and Director of Privacy and Abuse Management at ExactTarget, and Jess Kaplan, Abuse Desk Committee Vice-Chair and Senior Email Compliance Analyst at ActiveCampaign. |
|||
M3AAWG 5 Episode 3 - THE STATE OF DDOS ATTACKS AND PREVENTION WITH RICH COMPTON, M3AAWG DDOS SPECIAL INTEREST GROUP CHAIRMarch 05, 2021 I recently sat down with Rich Compton, M3AAWG DDoS Special Interest Group Chair and Principal Engineer at Charter Communications, to learn more about the evolving state of DDoS attacks especially amidst the pandemic-driven distributed workforce, what the DDoS Special Interest Group is focused on this year, the most prominent events and issues involved in anti-DDoS work, and more. |
|||
M3AAWG 5 Episode 2 - Brexit and Schrems II with Simon McGarr, M3AAWG Senior AdvisorFebruary 09, 2021 Welcome to the second episode of M3AAWG 5, our new video series where we interview members and experts on emerging threats or prominent issues across the industry. |
|||
M3AAWG 5 Episode 1 - Intent, Content, Consent with Shannon Donohue of EZ TextingNovember 30, 2020 Welcome to the first episode of M3AAWG 5. I sat down with Shannon Donohue, Vice President, Global Connectivity at EZ Texting and M3AAWG Training Committee Co-Chair to learn more about a messaging vetting methodology developed by her team called “Intent, Content, Consent” and discuss how advances in machine learning can help the vetting process become faster, easier and more effective at identifying and blocking malicious messages. |