Demo: How to Identify Risky Suppliers in Email Fraud Attacks

Presented by

Julie Stoneburg, Email Fraud Strategist

About this talk

The continual rise in Business Email Compromise (BEC) attacks has been fueled by fraudsters evolving their tactics from traditional domain spoofing and lookalike domains to impersonating your suppliers. Identifying your risky suppliers and layering in visibility around risk of impersonation, malicious lookalike domains, and threats to you is key to securing this critical element of your business. Integrated with your Proofpoint email gateway, Proofpoint Email Fraud Defense provides a holistic view of how your suppliers are potentially putting you at risk for supplier invoice fraud. So how can you take advantage of your existing Proofpoint investment and start mitigating supplier risk? Join this 30-minute live demo to learn: - How to obtain visibility into supplier invoice fraud - How to protect your own domains against identity deception - How to leverage your Proofpoint email security investment to better protect against all forms of BEC
Related topics:

More from this channel

Upcoming talks ()
On-demand talks ()
Subscribers ()