Email Fraud Case Study: Real Attacks & Defense Strategies With US Secret Service

Logo
Presented by

Ryan Terry, Product Marketing, Proofpoint & Stephen Dougherty, Financial Investigator, US Secret Service

About this talk

Email fraud is one of today's most common – and most costly – cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC / CEO fraud attacks, W2 scam, ransomware… the list goes on and on. What’s the best way to defend your organization from business email compromise (BEC) and other email spoofing attacks? Join our experts, Ryan Terry, Manager, Product Marketing from Proofpoint and Stephen Dougherty, Contractor - Financial Investigator from the United States Secret Service - Global Investigative Operations Center (GIOC), for a deep dive into real world email fraud examples and a discussion of best practice defense strategies. We’ll share: - Common identity deception tactics cyber criminals use to target your employees, business partners, and customers - How fraudsters use social engineering to reach the right person at the right time - How to identify and stop email fraud attacks before they reach the inbox *This session is eligible for CPE credits with ISC(2). To submit for CPE credits, visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (758)
Subscribers (79701)
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.