InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Protect Your Data Against Supply Chain Attacks with Proofpoint

Presented by

Ade Nae-Gamliel, Cloud Security Solutions Architect at Proofpoint

About this talk

Supply chain attacks happen when a cybercriminal targets a vendor who has access to the valuable information of a larger organization or multiple organizations. According to Accenture Security, indirect attacks against weak links in the supply chain now account for 40 percent of security breaches1. So how can companies detect these attacks and harden security defenses against them? Join Proofpoint experts for a 30-minute webinar on supply chain attacks and how to protect your organization from these attacks. In this session, they’ll explore: - What is the SolarWinds/Solarigate campaign and ATP29 - How threat actors are living off the land with tools that exist in your environment to launch supply chain attacks - How Proofpoint security products can help you defend against supply chain attacks 1|Accenture Security. “Third Annual State of Cyber Resilience. Innovate for Cyber Resilience.” January 2020.
Proofpoint

Proofpoint

85494 subscribers826 talks
Protect people. Defend data.
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
Related topics