BEC attack methods, and how to stop them

Presented by

Corie Chung, Chief Strategy Officer - Perception Point; Benny Reich, VP Products - Perception Point

About this talk

If you're in email security, you probably know that BEC is something to be worried about. It's very hard to detect and plays very well on human vulnerabilities. But do you really understand how this attack works? Did you know that BEC isn't just social-engineering but also relies on payload-based attacks? Did you know real-time prevention (and not detection) of BEC attacks is possible with the right techniques? Join our Chief Strategy Officer and VP Products to learn more about: 1. What BEC really means 2. How BEC attackers think and how they work their way into your organization 3. Real-life examples of BEC attacks 4. How you can better protect your company

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (15)
Subscribers (1527)
Perception Point - Advanced collaboration security designed for the modern enterprise. Perception Point is a next-gen Israeli cybersecurity company leading advanced threat prevention across enterprise collaboration channels. We've built-in multiple scanning engines and comprehensive threat intelligence for enhanced protection against both advanced threats and known attacks (e.g. phishing and commodity malware). We’ve invented the first technology to combine hardware visibility with software agility to see what leading solutions miss. Our propriety software algorithms x-ray code at CPU-level to intercept advanced attacks at the earliest stage possible —the exploit—before malware is delivered. No sandbox required.