Live Demo - How to stop BEC attacks with Proofpoint

Logo
Presented by

Thomas O'Leary, EFD Product Specialist & Sara Pan, Sr. Product Marketing Manager

About this talk

Business Email Compromise (BEC) often starts with an email in which attackers pose as someone the victim trusts. The message makes a seemingly legitimate business request that usually involves wire transfer or financial payment. Common BEC tactics include domain spoofing, display name spoofing, and lookalike domains. None of these emails carries malicious payload, and they are narrowly targeted at few people within an organization. Therefore, it is hard to detect these new forms of email threat. Join this live demo and learn more about the following: - How does BEC work - Real-life examples of BEC attempts - How does Proofpoint address common BEC use cases
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (755)
Subscribers (79533)
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.