Live Demo: How to Defend Against Supplier Account Compromise

Logo
Presented by

Sara Pan, Sr. Product Marketing Manager, Proofpoint, Mike Micolino, Sr. Sales Engineer, Proofpoint

About this talk

Attackers have turned supply chains into a highly effective new threat vector for launching indirect attacks. First, they compromise a supplier’s account, then they leverage the compromised account to send malware, steal credentials and perpetrate invoicing fraud. These threats often account for large financial losses and are extremely difficult to identify because they come from legitimate accounts. So how can you protect your company? Watch our 30-minute live demo to learn: - How supplier account compromise works - Examples of attacks being used today - How Proofpoint can help defend against this threat
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (759)
Subscribers (79729)
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.