InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Rethinking the SEG: How NFP Improved Threat Detection and Reduced Spend

Presented by

James Fritz, CISO, NFP and Gretha Loubser, Product Manager, Platforms, Abnormal Security

About this talk

As a leading insurance broker and consultant with a global reach and numerous acquisitions each year, NFP understands the critical importance of email security. However, the complexity of managing email threats, while integrating newly acquired companies, requires a new approach that dramatically simplifies administration, eliminates inefficient spend, and effectively stops advanced threats. In this must-attend session, you’ll discover: ● What led NFP to reevaluate their legacy tools and consider replacing the SEG ● How the team is mitigating financial losses from advanced email threats ● Why they’re focused on keeping graymail out of executives' inboxes ● The process they use to integrate newly acquired companies with ease ● Why they turned to Abnormal to simplify and improve their email security Don't miss the chance to hear directly from James Fritz, an industry expert with years of experience, as he shares his journey and offers recommendations for security teams seeking to move beyond the limitations of the SEG. Register today!
Abnormal AI

Abnormal AI

16722 subscribers147 talks
Abnormally-Precise, Cloud-Native Email Security
Learn more about new approaches to email security to stop advanced business email compromise attacks that bypass traditional, threat intelligence-based email security solutions. Unlike legacy email security solutions, the Abnormal Security platform uses an innovative AI-based approach that deeply understands the people, relationships, and business processes to stop the most sophisticated and costly attacks.
Related topics