How to Build An Advanced Email Security Strategy

Presented by

Richard Davis, Dir, Cyber Security Strategy and Adenike Cosgrove, Cyber Security Strategy - EMEA, Proofpoint

About this talk

You may know that email is a top vector for advanced threats targeting your organisation. But did you know that attackers have evolved their techniques to bypass even your most sophisticated email security tools? Your people, data, and brand reputation are at serious risk. Join the Proofpoint for "How to Build an Advanced Email Security Strategy." to learn about: • The latest email fraud techniques, including business email compromise (BEC), ransomware, and sandbox-evasion threats. •Key steps to building an email security strategy that can adapt to and stop attacks before they reach the inbox. • How to respond to and mitigate security risks faster and more reliably at a reduced cost.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (1127)
Subscribers (13323)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more