InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Combating Business Email Compromise (BEC) & Email Account Compromise (EAC)

Presented by

ISSA International

About this talk

Since 2016, Business Email Compromise (BEC) and Email Account Compromise (EAC) have become an exponentially increasing problem, costing organizations over $26 Billion in losses according to the FBI. These very targeted attacks utilize public research and social engineering to target an organization’s people and fraudulently obtain funds and valuable information. So how can you better protect your end users in 2020? Join us for our webinar to learn more about these BEC and EAC attacks and how you can effectively protect your organization's most valuable assets: your people and your data. In this session we'll share: •Techniques for preventing these cyber threats •A framework for understanding where potential gaps exist •What a people-centric approach looks like to better protect your company Moderator: Lee Neely, Senior IT and Cybersecurity Professional, LLNL Speakers: Tanner Luxner, Product Marketing Manager, Proofpoint Sue Bergamo, CIO & CISO, Episerver
Proofpoint

Proofpoint

85429 subscribers826 talks
Protect people. Defend data.
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Related topics