Google and Yahoo announced a new set of requirements for email delivery last October, resulting in a rapid increase of DMARC (Domain-based Message Authentication, Reporting and Conformance) authentication adoption. However, meeting DMARC requirements is just the beginning. Impersonation risk remains — in the form of spoofed emails, brand abuse and threats from fake or compromised suppliers. Hijacked business communications often lead to significant financial losses and reputation damage. So how can your organization further mitigate impersonation risk even after you achieve DMARC compliance?
Join Proofpoint and ISC2 on July 18, 2024 at 1:00 p.m. Eastern/10:00 a.m. Pacific as we discuss:
-Common impersonation tactics and real-world attack examples
-Challenges and benefits of enforcing email authentication
-Risks posed by impersonated suppliers
-How AI is affecting threats like business email compromise (BEC)
-Critical controls that help reduce impersonation risk