Email Security & Protection , Email Threat Protection
Protecting Yourself From Your Supply Chain: A CISO Panel on Email Security
While you may be confident in your own email security, the truth is that your security is only as good as your partners’ and vendors’. Attackers have pivoted their strategy to focus on exploiting these trusted relationships to launch supply chain attacks, including payment, invoice, and RFQ fraud. In many cases, they compromise real vendor email accounts and use real emails to divert money and steal valuable IP. And with traditional email security, there is little you can do to stop it.
Worried yet?
View this webinar OnDemand now and learn how to identify and stop supply chain threats, including vendor email compromise. Dr. Eric Cole (former CTO of McAfee, SANS Institute Senior Fellow, virtual CISO), and Mike Britton of Abnormal Security (former CIS of Alliance Data), provide insights into how they’ve prevented these attacks from targeting companies and damaging their reputation.
Discussion topics include:
- VEC by the Numbers: What are the latest trends in supply chain fraud and vendor email compromise attacks?
- The Impact of Supply Chain Fraud: What are the risks from compromised vendor attacks?
- Anatomy of an Attack: How do threat actors carry out supply chain attacks?
- How Attacks Get Through: Why do existing tools fail and what solutions exist?