InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Greenhill Tackles Security Threats in Global Investment Space

Presented by

John Shaffer, CIO/CISO, Greenhill & Co. and Ryan Schwartz, Sr. Product Marketing Manager, Abnormal Security

About this talk

Greenhill & Co. leads its client businesses through major milestones and complex processes: completing mergers and acquisitions, restructuring, raising capital, and obtaining financing. This position makes Greenhill an attractive target for cybercriminals seeking to steal data and funds through pervasive business email compromise (BEC) attacks. CIO/CISO John Shaffer fully recognizes this challenge and has responded with a strategic line of defense against these sophisticated attacks.   On October 26, join our live 30-minute session as John offers security best practices and unique insights from the finance industry. Namely, learn how he:   * Mitigated risk, maintained compliance, and gained efficiencies for Greenhill’s email ecosystem  * Prevented over 11,000+ name impersonation attacks, from internal executives to trusted vendors * Restored time for his security team and bolstered client confidence by improving threat responses Register now to gain valuable insights from this security leader!
Abnormal AI

Abnormal AI

16868 subscribers147 talks
Abnormally-Precise, Cloud-Native Email Security
Learn more about new approaches to email security to stop advanced business email compromise attacks that bypass traditional, threat intelligence-based email security solutions. Unlike legacy email security solutions, the Abnormal Security platform uses an innovative AI-based approach that deeply understands the people, relationships, and business processes to stop the most sophisticated and costly attacks.
Related topics