![]() |
A Blueprint to Defend Against Business Email Compromise (BEC) and Email Account Compromise (EAC)BEC and EAC have cost organizations $26B over a three-year-period. How can your organization best protect itself against these costly threats? Join this Proofpoint customer session to hear about strategies, best practices and lessons learned to defend against BEC and EAC. Speakers:
|
![]() |
Best Practices: Implementing DMARC for Inbound EmailMany organizations are adopting DMARC. This best practices session discusses how you can take advantage those DMARC records and improve inbound email security. Speakers:
|
![]() |
Best Practices: Office 365 with ProofpointAs organizations have moved to the cloud with Office 365, protecting your messaging and collaboration environments has changed as well. In this session, we will cover actions and configurations you should be taking to protect your organization. Speakers:
|
![]() |
Best Practices: Preventing Business Email Compromise and Email Account CompromiseWhether they are spoofing an identity (BEC) or stealing a valid identity (EAC), attackers use of identity deception is on the rise. Learn best practices using Proofpoint to protect your people from BEC and EAC. Speakers:
|
![]() |
Leverage VAPs as a Blueprint to Apply Adaptive ControlsIn this breakout session, you will learn how to leverage your unique Very Attacked People (VAP) insight as a blueprint to proactively protect your users from targeted threats by applying adaptive controls. Hear directly from our customers on how they deploy our solutions for better protection against future attacks. Speaker:
|
![]() |
Reducing Phishing Attacks and Operational Costs through AutomationWith email as an organization's number 1 threat vector, phishing messages consume a significant portion of security team's time to execute on incident response. Join this session to see a Proofpoint customer has reduced phishing attacks, achieved operation savings through automation, and saved countless hours of remediation work. Speakers:
|
![]() |
Stopping Identity Deception with DMARCIdentity deception attacks have cost companies around the world billions, and can destroy brand reputation and consumer trust in a matter of minutes. In this session, you’ll learn about a Proofpoint customer’s DMARC journey. Gain insights on the strategies, challenges and lessons learned in implementing DMARC. Speakers:
|
![]() |
Threat Actors' New Blueprint: Combining Email and Cloud ThreatsThe campaigns that combine email and cloud vectors are on the rise. Join Proofpoint Threat Research as they expose how attackers use legitimate cloud services, like Microsoft Sharepoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC attack. Speakers:
|