Hi [[ session.user.profile.firstName ]]

How to Defend Against Email Fraud from Compromised Suppliers

Email fraud schemes have evolved to include supplier account compromise. Based on Proofpoint’s internal research, 98% of monitored organizations have received threats from their suppliers— whether they’ve been spoofed or compromised. Unfortunately, most organizations lack visibility into which suppliers pose risk. So how can you better defend against threats from these risky suppliers?

Watch our webinar for a deep dive into the best practices of combating supplier impersonation and account compromise. In this session, we'll cover:

- Real-world supply chain fraud examples
- Grading risk in your suppliers
- How to detect threats, including payroll diversion and supplier invoicing fraud
- A framework that helps you stop these multi-million-dollar email fraud attacks
Recorded Apr 23 2021 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Sara Pan, Sr. Product Marketing Manager, Proofpoint
Presentation preview: How to Defend Against Email Fraud from Compromised Suppliers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Warum ältere Sicherheitstools keine Chance bei Insider-Bedrohungen haben Jun 24 2021 8:00 am UTC 60 mins
    Markus Pauly & Julian Maaus, Cybersecurity Engineer, Proofpoint DACH
    Legacy DLP-Lösungen blieben hinter den Erwartungen zurück; eine neue Generation an Lösungen verspricht jetzt Abhilfe.

    Daten verlieren sich nicht von selbst. Denn oftmals entstehen Sicherheitslücken und Datenverlust erst durch fahrlässiges oder sogar böswilliges Verhalten von Mitarbeitern. Dies gilt heute mehr denn je, da mehr Mitarbeiter im Home-Office arbeiten und die digitale Abhängigkeit zunimmt. Fakt ist, heute ist der Mensch der Perimeter des Unternehmens und jeglicher Schutz von Daten und Informationen muss beim Menschen ansetzen, um effektiv zu sein.

    Wie lässt sich das Insider Risiko also beherrschen?

    In unserem Webinar stellen wir Ihnen einen Ansatz vor, der Transparenz bietet und den Kontext von Handlungen in die Risikobewertung mit einbezieht. Dadurch kann die Gefahr eines Datenverlusts abgewehrt werden, noch bevor sich daraus ein teurer Zwischenfall entwickelt.

    Folgende Inhalte erwarten Sie:

    - Erläuterung von Insider-Bedrohungen und deren Konsequenzen auf das Risiko von Datenverlust
    - Abwägung zwischen der Abwendung von Bedrohungen (Prevention) und deren Erkennung bzw. Reaktion auf Zwischenfälle (Detection + Response)
    - Tipps aus der Praxis anhand von Beispielen
    - Live Demo
  • Why Legacy Security Tools Won't Cut It with Insider Threats Recorded: Jun 17 2021 29 mins
    Sai Chavali, Sr. Product Marketing Manager of Insider Threats at Proofpoint
    Today, insider risk and data loss prevention (DLP) are a top concern for organizations with a distributed workforce and increasing reliance on technology. Legacy, on-prem DLP technology hasn’t lived up to its promises. That’s because data loss begins with people – whether negligent, compromised or malicious insiders. So how do you better protect your organization against insider risks?

    Join our experts on for a 30-minute live webinar and demo where we will show you how a modern, unified approach can stop people-led data loss before it becomes a costly incident.

    In this session, you will learn:

    - The unique risks of insider threats and how to protect against data loss
    - How to balance prevention with detection and response policies
    - Practical tips from real-world breaches to strengthen your insider threat program
  • Protect Your Data Against Supply Chain Attacks with Proofpoint Recorded: Jun 17 2021 35 mins
    Ade Nae-Gamliel, Cloud Security Solutions Architect at Proofpoint
    Supply chain attacks happen when a cybercriminal targets a vendor who has access to the valuable information of a larger organization or multiple organizations. According to Accenture Security, indirect attacks against weak links in the supply chain now account for 40 percent of security breaches1. So how can companies detect these attacks and harden security defenses against them?

    Join Proofpoint experts for a 30-minute webinar on supply chain attacks and how to protect your organization from these attacks. In this session, they’ll explore:

    - What is the SolarWinds/Solarigate campaign and ATP29
    - How threat actors are living off the land with tools that exist in your environment to launch supply chain attacks
    - How Proofpoint security products can help you defend against supply chain attacks

    1|Accenture Security. “Third Annual State of Cyber Resilience. Innovate for Cyber Resilience.” January 2020.
  • Four Best Practices to Combat Insider Threats in Your Supply Chain Recorded: Jun 16 2021 29 mins
    Rob Bolton, Senior Director, Information Protection, Proofpoint EMEA
    Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches.

    Safeguarding your organisation's IP and user data relies upon a people-centric approach to managing insider risk.
    Collaboration has been key to many organisations’ success throughout the transition to remote working. Broadening the supply chain to collaborate with remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches.

    Safeguarding your organisations’ IP and user data relies upon a people-centric approach to managing insider risk.

    Join us as we discuss how the technology sector and others in agile, collaborative industries can manage insider threats. In this session, you will learn how to:

    - Allow for open collaboration by using data to identify user risk
    - Protect your competitive advantage with real-time IP data tracking
    - Safeguard user data when working with third parties to remain compliant
    - Prepare your incident response plan to avoid unnecessary data loss
  • Email Fraud & Cloud Threats - Perspectives from a CISO & Analyst Recorded: Jun 15 2021 58 mins
    Andras Cser, Analyst from Forrester Research & Lucia Milica, Resident CISO at Proofpoint
    The email and cloud vectors have been combined by threat actors to target organizations’ most vulnerable asset: their people. Whether it’s an email with a link to a legitimate file sharing site or a 3rd party application, these attacks are aimed at specific people in an organization to steal money, data or sensitive information. So how can you combat targeted attacks and better protect your users?

    Join us for a 1-hour special panel discussion with guest speaker from Forrester Research Andras Cser, VP & Principle Analyst, and Lucia Milica, Proofpoint’s Global Resident CISO. Our experts will cover:

    - Industry and organizational challenges security leaders have in today’s threat landscape
    - How to run security programs to protect your people and organization
    - What a successful security program looks like
  • Is Microsoft 365 the attackers' new playground? APJ Edition Recorded: Jun 14 2021 50 mins
    Adrian Covich & Brandon Warren, Proofpoint APJ
    Driven by Microsoft 365, digital transformation is remaking every aspect of modern business. Many organisations are moving to a 'cloud first' model, but security is often not invited to the table early enough.

    As businesses move to the cloud, particularly SaaS applications like Microsoft 365, there is a sense of loss of control - control of data and of the protection against the threats targeting users. Bad actors continue to target end users with advanced threats that can slip through gaps in your security infrastructure.

    Join us as we discuss how to leverage next-generation protection to ensure security for your employees on Microsoft 365.

    In this 30-minute session, we will examine:

    - How you can get visibility into all threats targeting your organisation
    - Which threats that are evading your current defences
    - How best to block threats before they hit your employee’s inboxes
    - How businesses have adopted a people-centric security model to communicate and reduce risk
  • Machine Learning: Using NexusAI to Enable Regulatory Compliance Recorded: Jun 3 2021 31 mins
    Rick Dales, VP of Product Management, Dan Rapp, VP of Engineering & Data Science at Proofpoint
    False positives are the bane of any team reviewing digital communications to help enable regulatory compliance. They’re flagged as potential risks, so teams must spend countless hours manually reviewing and removing them from their queues. There is a better way.

    Proofpoint NexusAI for Compliance provides out-of-box machine learning models that utilize past reviewer decisions to significantly reduce low-value supervision content. This allows you to focus on meaningful content, while reducing reviewer fatigue and human errors caused by fatigue.

    Join us for a 30-minute webinar for a deep dive into this new technology. Our experts will:

    - Discuss how AI/ML technology can help enable regulatory compliance
    - Illustrate how you can remove up to 65% of false positives compared with legacy systems without machine learning
    - Demonstrate integration with Proofpoint Intelligent Supervision, offering next generation surveillance
  • Live Demo: Defending Against Email Fraud with Proofpoint Threat Protection Recorded: May 27 2021 33 mins
    Brett Shaw, Senior Product Marketing Manager, Proofpoint, Inc., Victor Soares, Group Product Manager, Proodpoint, Inc.
    Email fraud is rife. In fact, the FBI reported that email fraud attacks accounted for nearly $1.9 billion losses in 2020. These attacks are very difficult to detect, not only because they don’t contain payloads, but because they can appear to come from trusted sources, like a C-level executive or even a hijacked supplier account. So how can you better protect your organization?

    Watch our live demo on how you can defend against and identify email fraud with Proofpoint’s Threat Protection Platform.

    We cover:

    - The different tactics threat actors use to target your users with BEC attacks
    - Best practices to prevent attacks and identify who is being targeted
    - How Proofpoint helps mitigate risk, provide visibility and drive operational efficiency
  • May Insiders Meeting Panel: Getting Buy-In for Your Security Awareness Program Recorded: May 26 2021 50 mins
    Mike Bailey, Sr. Product Marketing Manager at Proofpoint and Customer Panelists
    We are trying something new with Insiders Meetings. We know you love hearing from your peers at Wisdom every year but want more engagement with them outside of our once-a-year user conference.

    Based on your feedback, we're kicking off a new 1-hour panel format where you'll be able to hear from your peers, ask questions, and make new connections. Our theme in May will be “Springing into Action: Get Buy-In for your Security Awareness Program”.
  • Protecting Healthcare’s Supply Chain Recorded: May 21 2021 57 mins
    Peter Rucys, Tampa General Hospital, Rob Holmes, Email Fraud Defense, Ryan Witt, Proofpoint Healthcare Customer Advisory
    In a recent survey, Proofpoint found that the average healthcare organization received about 200,000 emails from over 10,000 different domains, including those belonging to research organizations, construction companies, grantors and foundations and insurers, as well as classic supply chain participants. Of these clients, 98% received some email-based threat and 97% received threats from at least one of their suppliers’ domains via impersonation or business email compromise. One trend stands out: today’s attacks target people, not just infrastructure. The sheer volume and value of business conducted by email is a noteworthy reason to focus on protecting your supply chain. In this session, we’ll discuss the most critical issues impacting healthcare IT and Security leaders today.
    We’ll share:
    • A view into the current threat landscape
    • The unique risks of the supply chain to patient safety
    • Security considerations and transformations for 2021
  • Targeted Behavior Change for Security Awareness Training Recorded: May 20 2021 31 mins
    Robert Shields, Sr. Product Marketing Manager & Susan Mackowiak, Sr. Director of Content at Proofpoint
    Behavior change is the ultimate goal for security awareness training. To be successful at mitigating threats, organizations need to implement a targeted, agile security awareness training program that considers today’s threat landscape as well as the diversity of their workers’ roles and knowledge. By accommodating roles, competencies and threats, companies can accelerate behavior change to build a strong security culture. So how can you achieve this?

    Join us for a 30-minute webinar as our experts discuss how to build an effective security awareness training program and culture.

    In this session we will explore:

    - A new framework to guide content creation
    - The curation of content that addresses your threats, risks and compliance needs
    - Personalized learning paths you can leverage to change behavior and enable culture change
  • Critical Considerations for Slack and Teams Initiatives Recorded: May 19 2021 38 mins
    Shannon Smith, Archiving Sales Specialist, Proofpoint, Frank Beck, Senior Sales Engineer
    Employees depend on digital communication tools to collaborate more than ever before. Chat and collaboration apps have made it possible for employees to communicate with ease, but they can also put organizations at risk. As they adopt new communication tools, companies need to ensure that security, compliance, and legal requirements are considered and adequately addressed.

    Watch this webinar where we discuss critical considerations for a successful collaboration initiative. You’ll learn about:

    - Importance of a fit analysis
    - Engaging the right players
    - Security considerations
    - Legal and compliance concerns
  • Seeing the Attacker’s View: A People-Centric Approach to Security Discussion Recorded: May 18 2021 48 mins
    Richard Davis, Cyber Security Strategist, Proofpoint & Dominic Trott, UK Product Manager, Orange Cyberdefense
    It’s no secret that modern attackers have pivoted to targeting people, largely via simple phishing emails. A simple internet search can tell them all they need to know about who has access to the system or data they are targeting.

    You likely know that email fraud, or BEC, is costing organizations billions of dollars. But do you know why these attacks continue to reach new levels of success?

    Join this session as we discuss how you can identify your most attacked and riskiest users, understand how they are being attacked and design better strategies and protections to prevent these attacks being successful and minimise your cybersecurity risk.
  • 4 Strategies to Combat Insider Threats in Your Supply Chain Recorded: May 12 2021 31 mins
    Sai Chavali, Sr. Product Marketing Manager, Proofpoint
    Collaboration is key in today’s workplace. However, broadening the supply chain to include remote employees, new applications, increased cloud-based storage and new sanctioned endpoints has created new opportunities for insider-led breaches. To safeguard your critical IP and sensitive data, organizations need to take a people-centric approach to protect their data and mitigate insider risk.

    Watch our 30-minute webinar to learn about how the technology sector and others in agile, collaborative industries can manage insider threats. In this webinar, we’ll cover the four strategies on how to:

    ● Allow for open collaboration by using data to identify user risk
    ● Protect your competitive advantage with real-time IP data tracking
    ● Safeguard user data when working with third parties across your supply chain to remain compliant
    ● Prepare your incident response plan to avoid unnecessary data loss
  • Email Fraud - 2020 FBI Report & What You Should Know Recorded: May 11 2021 32 mins
    Sara Pan, Sr. Product Marketing Manager, Proofpoint
    According to the 2020 FBI Internet Crime Report, attackers have shifted their email fraud tactics away from hacking the email accounts of C-levels to compromising vendor emails. The report also reveals that email fraud accounts for 44% of all reported losses in 2020. While these attacks are low volume, they represent huge dollar losses and are constantly evolving. So how can you better protect your company?

    Watch our 30-minute webinar for a deep dive into the FBI insights of email fraud and the best practices of combating it. In this session, we'll cover:

    · What email fraud variants the FBI report has called out
    · How attackers leverage impersonation and compromised accounts jointly in an attack
    · What security controls and framework you can adopt to better defend against email fraud
  • How to Navigate Insider Risk: Top Tips from Gartner's Market Guide Recorded: May 11 2021 32 mins
    Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, Proofpoint
    Insider threats may initially appear to be just like any other threat, but the big difference is that insiders are in a position of trust. So how do you deal with these malicious or accidental threats that come from people within the organisation?

    Watch Proofpoint’s experts Brian Reed, Cybersecurity Evangelist and Rob Bolton, Sr Director Intl, as they discuss the top tips from Gartner’s new report on Market Guide for Insider Risk Management Solutions. You will learn:

    - The “Rule of Three” for insider threats (including threat types, threat activities, and mitigation goals)
    - How to employ an insider threat mitigation program comprising people, processes, and technology
    - Considerations when purchasing insider risk management technology

    Discover what you need to know about insider threats, how to protect your organisation and navigate these risks.
  • Live Demo: Identify, Report & Prevent Phishing with Security Awareness Training Recorded: May 6 2021 29 mins
    Kevin Rohm, Account Executive, Proofpoint, Inc.
    99% of the phishing attacks require human interaction to succeed, potentially exposing your organization to email fraud, ransomware, data loss and breaches.

    Educate your users and reduce your phishing risk through Proofpoint’s industry-leading security awareness solution. Backed by threat intelligence, Proofpoint’s Security Awareness Training ensures you are delivering the right training, to the right people, and at the right time.

    Watch our 30-minute live demo to learn how to:

    - Prepare users for new attacks by leveraging threat intelligence to continuously understand which people and what threats are targeting your organization
    - Assess your users’ susceptibility to phishing attacks and social engineering
    - Drive behavior change by turning your users into security assets with engaging, relevant and entertaining training
  • The Cost of Cloud Compromise and Shadow IT Recorded: May 5 2021 61 mins
    Larry Ponemon, Ponemon Institute and Itir Clarke, Proofpoint
    With the increased use of SaaS applications, cloud account takeover and Shadow IT present an increasing security risk to organizations. As the network perimeter is replaced by a user-defined security perimeter, it becomes critical to evaluate access controls, threat detection and data security in the cloud. So how can you better protect your company?

    Join us for this special webinar with experts from Proofpoint and Ponemon Institute. They will discuss the findings of the newly conducted research among IT and security professionals to determine the risk and cost of cloud account takeovers and Shadow IT.
    In this session, we’ll cover:
    • The state of cloud usage in organizations
    • Security risks and practices to secure the cloud
    • Cloud compromises and the end user risk
    • The cost of compromised cloud accounts
  • Compliance & Risk Mitigation for Healthcare Recorded: May 4 2021 36 mins
    Ryan Witt, Healthcare Industry Practice Leader, Robert Kreuscher, Sr. Sales Engineer, Shannon Smith, Archive Sales Specialist
    Cloud-based applications like Microsoft 365 keep your healthcare organization operating, especially in today’s digital world. Yet securing data, adhering to data privacy and record keeping, while protecting against fraudulent activity, can be a significant challenge. Healthcare organizations need a people-centric approach to detecting risky behavior and litigation readiness.

    Watch our 30-minute panel discussion about how your peers are addressing these challenges and the steps you can take to ensure compliance across your electronic communications ecosystem. This session covers:

    - Common compliance challenges and pitfalls when it comes to e-discovery and risk detection, especially around Microsoft 365
    - How your capture and archive strategy can augment your information protection program
    - How Proofpoint’s people-centric approach to security and compliance helps better protect healthcare organizations
  • Security Leaders' Panel: Has Phishing Reached a Crisis Level? Recorded: Apr 29 2021 80 mins
    Lucia Milica, CISO, Proofpoint, Robbie Meitler, AVP, Liberty Mutual, Rebecca Harness, CISO, Saint Louis University
    Phishing and social engineering attacks continue to grow in frequency and sophistication. They challenge security leaders and practitioners who struggle to track and stop their elusive and persistent tactics. Given the magnitude of the challenge, many security leaders consider this their No. 1 priority for 2021.

    Join our customer and CISO panel to learn more about these threats and how security leaders are using intelligence, controls and their people to reduce the risk of breach and data loss.

    In this session, our experts will cover:

    -How phishing and social engineering attacks have increased
    -How organizations are being targeted
    -How your company culture affect risk
    -Options for you to better protect you company
Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Defend Against Email Fraud from Compromised Suppliers
  • Live at: Apr 23 2021 12:17 am
  • Presented by: Sara Pan, Sr. Product Marketing Manager, Proofpoint
  • From:
Your email has been sent.
or close