̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

proofpoint_logo.png
Proofpoint

Mitigating Business Email Compromise and Fraud with Email Fraud Defense


Event Date: September 22, 2020

Email fraud leads to two main threats - one is Business Email Compromise (BEC) where attackers pretend to be you; the other one is Email Account Compromise (EAC) where attackers become you. BEC/EAC scams have cost the victimized organizations over $26 billion since 2016. What they have in common is that they both target people.

They both rely on social engineering and are designed to solicit fraudulent wire transfers or payment. Unlike malware attacks, BEC and EAC don’t typically include a detectable malicious payload. These types of threats can be hard to
recognize because of the target these organizations requests sent by the impostors seem very routine and reasonable

During this webinar, Proofpoint and ̽»¨ÊÓÆµ discussed:
  • What BEC and EAC are and how they work
  • The common attack tactics regarding these new forms of email threats
  • Best practices to defend against BEC and EAC

Fill out the form below to view this archived event.


Resources


ClickFix, OAuth Exploits, and AI Phishing: A Salesforce Security Briefing for U.S. Federal Teams
Blog

ClickFix, OAuth Exploits, and AI Phishing: A Salesforce Security Briefing for U.S. Federal Teams

This briefing outlines the rapidly evolving cybersecurity threats facing federal Salesforce environments, including OAuth exploitation, AI-powered phishing, and emerging attack techniques like ClickFix. It connects real-world nation-state activity and workforce reductions to increased risk exposure, highlighting gaps in Salesforce’s native security capabilities. The piece positions enhanced monitoring and specialized security solutions as critical for protecting sensitive government data and maintaining compliance.


Fill out the form below to view this Resource.