![]() |
Practitioner's Session: Supercharge your Threat Protection Program with IntegrationHow you integrate the components of your threat protection program can be the difference between a go-kart or a Ferrari. Learn how to configure and use integrations between Targeted Attack Protection, Isolation and Security Awareness Training to supercharge your security program. Speakers:
|
![]() |
Practitioner’s Session: Mechanics of Modern Fraud - How to Engage the BusinessBusiness email compromise is a large and growing problem that targets organisations of all sizes across every industry around the world. Fraudsters are constantly evolving their tactics and are now targeting your suppliers. The costs are devastating. BEC is a constant headache for CISOs, but a bigger headache can be trying to gain the attention of the business and buy-in from leadership to address BEC. This session will delve into the mechanics of modern fraud by dissecting the anatomy of a Business Email Compromise attack, and show how CISOs can build strategies to combat these threats, design a business case to effectively engage stakeholders to get BEC on their radar, and ultimately promote a culture of ownership. Speakers:
|