Demo: How to Identify Risky Suppliers in Email Fraud Attacks

Logo
Presented by

Julie Stoneburg, Email Fraud Strategist

About this talk

The continual rise in Business Email Compromise (BEC) attacks has been fueled by fraudsters evolving their tactics from traditional domain spoofing and lookalike domains to impersonating your suppliers. Identifying your risky suppliers and layering in visibility around risk of impersonation, malicious lookalike domains, and threats to you is key to securing this critical element of your business. Integrated with your Proofpoint email gateway, Proofpoint Email Fraud Defense provides a holistic view of how your suppliers are potentially putting you at risk for supplier invoice fraud. So how can you take advantage of your existing Proofpoint investment and start mitigating supplier risk? Join this 30-minute live demo to learn: - How to obtain visibility into supplier invoice fraud - How to protect your own domains against identity deception - How to leverage your Proofpoint email security investment to better protect against all forms of BEC
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (755)
Subscribers (79676)
Proofpoint, Inc. is a leading cybersecurity and compliance company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including 85 percent of the Fortune 100, rely on Proofpoint for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.