BEC Live Demo: Detect and Block BEC Scams with Proofpoint

Logo
Presented by

Thomas O'Leary, EFD Product Specialist at Proofpoint

About this talk

Welcome to Proofpoint's Cybersecurity eSummit! This is the 3rd session of a 3-session event. Feel free to watch the recordings of our previous webinars in the attachments & links tab. This session: Business Email Compromise (BEC) often starts with an email in which attackers pretend to be someone the victim trusts. The message makes a seemingly legitimate business request that usually involves wire transfer or financial payment. Common BEC tactics include domain spoofing, display name spoofing, and lookalike domains. None of these emails carries malicious payload, and they are narrowly targeted at few people within an organization. Therefore, it is hard to detect these new forms of email threat. Join this live demo to learn more about how Proofpoint: - Identifies common BEC attack tactics - Detects and blocks impostor emails - Provides actionable visibility and threat insights - Protects your brand and prevents fraudulent use of your domain - Trains your end users into your last line of defense
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (783)
Subscribers (81219)
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.