How often do you consider the impacts a breach in third-party communication could have on the business?
Cyber criminals continually seek opportunity from others adversity. Right now, there is fear, uncertainty, and anxiety within the workforce for criminals to leverage. As defenders, one of our biggest advantages has always been the ability to continuously evolve our security programs to stay ahead. Now is not the time for stasis.
As more of the workforce is working remotely, collaborating via digital platforms, and processing data from unsanctioned personal devices, the monitoring and controls we may have implemented as a business, to protect the infrastructure, could now be less effective. Yet criminal motivations may be the same and both their opportunity and attack surface have dramatically increased.
Throughout this virtual boardroom, we’ll explore how to gain visibility of your third-party communication, the technical controls you should put in place to mitigate business risk, as well as highlighting how taking a people-centric approach to security can be your best line of defence. This will also be an opportunity for the boardroom participants to share insights, experiences, challenges, and solutions, from within their organisations and an opportunity to learn from their peers.
How to Fight Back
- Sharing of insights into the range of attacks being perpetrated online as cyber criminals seek to exploit COVID-19
- With continued susceptibility to phishing scams, this may continue to make this approach attractive to for cyber criminals – learn from your peers how to fight back today
- Techniques to be aware of including bogus emails containing links and fake important updates being shared, which once clicked on, can lead to devices being infected
- Securing email communication to effectively defend your company against BEC and EAC attacks
- How DMARC can help you start to establish trust in your communication, gain visibility of the security journey your own supply–chain is on, and to allow you to guide and advise the workforce
- Understand your human attack surface and quantify the risk
- Gain insights into who is being attacked and who is vulnerable to attack, allowing you to deliver targeted education to act as your best line of defence against social attacks
This virtual boardroom will also equip participants with real-life case studies of how other businesses are obtaining practical approaches to supply-chain risk management, as well as the steps you could consider, to gain visibility and control of the business risk. We will also address:
- Attain a practical approach to supply-chain risk management
- An overview of how to obtain visibility and control of business risk within your organisation
- Gain clarity on the first steps to mitigating supply chain risk
- Analysis into detecting, analysing and blocking advanced threats delivered through malicious attachments and URLs, before they reach your employees
- An in-depth examination of how supply chain visibility can reduce complexity and boost efficiency
- Insights into developing and delivering targeted education to act as your best line of defence against social attacks
- Tangible tips and guidance on how to reduce risk and protect users across the whole organisation
Proofpoint is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organisations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.
“Solid event to share experiences with peers. Reconfirming & reassuring.”