Cybercriminal Minds - Evolving BEC Attack Tactics During Shelter-in-Place

Webinar

Live Panel: Defence Tactics for Business Email Compromise

Business Email Compromise (BEC) often starts with an email in which attackers pose as someone the victim trusts. In the message, there’s a seemingly legitimate business request that usually involves a wire transfer or financial payment. None of these emails carries malicious payload making it difficult to detect this new form of email threat.

But things are changing. Technology can now surpass people and process initiatives to proactively eliminate fraudulent emails, removing the guesswork for users.

Join this expert panel discussion to learn more about:
· How BEC attacks happen
· Why defenders must think beyond the phish into a multi-layered approach
· How Proofpoint provides actionable visibility and threat insights
· How Proofpoint identifies and blocks common BEC attack tactics