Cyber criminals are blending both email and cloud vectors. A single malicious email can lead to an infiltrated cloud account. 94% of data breaches start with attacks targeting people via email. So organizations need a holistic approach and solution to combine security efforts across all channels.
Join our experts as they expose how attackers use cloud services, like Microsoft SharePoint, to redirect people to phishing sites and phish for login credentials and Office 365 OAuth tokens. Or how they compromise a cloud account to launch a BEC or EAC attack. In this session we’ll cover:
- Trends and modern threat landscape
- Case studies on how threat actors leverage legitimate cloud services to launch attacks
- How to address these sophisticated hybrid attacks
*All sessions are eligible for CPE credits with ISC(2). You must be an active member with ISC(2) to receive credit. To submit your credits, please visit https://go.proofpoint.com/webinars-submit-cpe-credit.
Fill out the form to watch the webinar replay.