WEBINAR

Vendors, Villains and Victims: Building a Framework Against Supplier Email Fraud

Watch On-Demand

Recorded live on December 18, 2024

Impersonation threats are among the most targeted and deceptive email attacks that exploit your people’s trust. Of these, vendor email compromise (VEC) stands out as one of the hardest to detect, leveraging trusted supplier relationships to bypass even the strongest defenses and fool the savviest employees.   

How do you safeguard your organization when every account in your supply chain can become an initial access point? And how do you respond to supplier incidents you can’t see?
Join us for a 30-minute webinar to learn:  

  • What makes VEC unique and why it’s becoming a preferred tactic for cybercriminals   
  • Practical steps you can quickly implement to mitigate its risks  
  • A customizable framework for building comprehensive VEC protection  

Featured Speakers

Brette Petersen

Product Marketing Manager, Proofpoint, Inc.

Brette has several years of experience bringing technical products to market, with business expertise in multiple industries spanning Manufacturing, Aviation, Ecommerce, and Cybersecurity. At Proofpoint, Brette works directly with product developers, threat researchers, and end users to build advanced, people-driven email security solutions. Her special interests include ransomware prevention and preparation. Brette has a bachelor’s degree from the University of Nebraska, and a master’s degree in business from the University of Utah.

Mark Harris

Cybersecurity Advisor, Proofpoint, Inc.

Mark is a Cybersecurity Advisor at Proofpoint. As a Former Sr Director Analyst at Gartner, he covered a number of security topics, including email security, and was the lead author on the Market Guide for Email Security. Mark authored numerous research notes as well as Magic Quadrant, Critical Capabilities, Hype Cycle and Cool Vendor reports. Prior to Gartner, he spent over 20 years in a variety of Software engineering roles at both McAfee and Sophos, including 8 years running the threat research labs at Sophos. He has over a dozen patents around cyber security and is an experienced speaker that has presented at many conferences, including RSA, InfoSec, Hacker Halted as well as TV and Radio interviews.