![]() |
Practitioner's Session: Supercharge your Threat Protection Program with IntegrationHow you integrate the components of your threat protection program can be the difference between a go-kart or a Ferrari. Learn how to configure and use integrations between Targeted Attack Protection, Isolation and Security Awareness Training to supercharge your security program. Speakers:
|
![]() |
Strategies for Stopping Business Email Compromise AttacksBusiness Email Compromise (BEC) comes in many forms: gift card scams, payroll diversion schemes, supplier invoicing fraud and more. Regardless of the attack type, BEC leads the pack in cybercrime losses – nearly $2B in 2020. Join this customer session to gain insights on how to prevent BEC attacks. Speakers:
|
![]() |
Best Practices for Preventing Account TakeoverAs organizations shift to the cloud, stolen credentials become the new currency for cyber criminals. Credential phishing attacks lead to compromised accounts, which exposes your organization to greater risk. Join this session to learn how a Proofpoint customer is defending against account takeover. Speaker:
|
![]() |
Practitioner’s Session: Preventing Business Email Compromise and Email Account CompromiseWhether by spoofing an identity (BEC) or stealing a valid identity (EAC), attackers’ use of identity deception is on the rise. Learn actions and configurations you can implement with Proofpoint to protect your people from BEC and EAC. Speakers:
|