Noord Live.

Virtual Boardroom


Communicating with your supply chain – how to gain visibility and control of the business risk

September 23, 2020 | 11:00am CEST

 Hosted by

How often do you consider the impact a breach in your supply chain could have? 

Many companies depend on a variety of external vendors and partners to support their business activities. These interdependent relationships form a complex third-party ecosystem called the supply chain. Due to its complexity, the supply chain is an attractive target for cybercriminals.

The Supply Chain Risk

Unfortunately, a growing number of breaches are being attributed to supplier vulnerabilities.  In January 2019, Managed Health Services of Indiana announced that a phishing attack against a transportation vendor resulted in personal data for 31,000 patients being stolen.  More recently, Wipro, one of the largest technology service suppliers in the world, was infiltrated in order to attack their customers. Again, the entry point was a phishing scam targeting Wipro employees, whose accounts were then weaponized against retail customers as part of a gift card fraud scheme.

While the security industry has made significant progress thwarting generalised email attack campaigns, more directed impersonation and business email compromise(BEC) attacks are harder to detect and areincreasing in virulence.  Given that email impersonating a trusted business partner is more likely to trick the target into taking an unauthorised action, it’s time to shine more light on the supply chain as an abuse vector.

How to Fight Back

  • Securing email communication to effectively defend your company against BEC and EAC attacks—which, according to the FBI, have cost businesses $26B between June 2016 and July 2019—is a key first step to mitigating supply your chain risk
  • How DMARC and dynamic imposter detection can help you start to establish trust in your communication, it will give you visibility of the security journey your own supply chain is on, allowing you to guide and advise them as appropriate
  • Understand your human attack surface and quantify risk
  • Gain insights into how a people centric security model will help you quantify risk, understanding who is being attacked and who is vulnerable to attack allowing you to deliver targeted education to act as your best line of defence against social attacks

Throughout this virtual boardroom, we’ll explore how to get visibility and control of your supply chain communication, the technical controls you should put in place to mitigate risk as well as highlighting how taking a people centric approach to security can be your best line of defence. This will also be an opportunity for the boardroom participants to share insights and experiences, from within their own organisations.

    Boardroom Moderators.

    Matt Cooke

    Matt Cooke

    Cyber Security Strategist - EMEA, Proofpoint

    Matt Cooke is a Cyber Security Strategist at Proofpoint, where he creates relevant industry information and topical use-cases for the EMEA region. He provides insights and expertise, country by country, on cyber resilience and defences such as people-centric security, security awareness training and risk management.

    Örjan Westman

    Örjan Westman

    Regional Director - Nordics, Proofpoint

    Örjan Westman is Regional Director, Nordics at Proofpoint, where he is responsible for leading the overall business across a strategically important region for Proofpoint, driving customer acquisition and developing the regional partner ecosystem across the Nordic markets.

    Örjan Westman brings over 30 years’ experience from the network security, IT and cybersecurity industries, with a track record of driving channel-first sales organisations and aligning go-to-market strategies to customer needs in fast-moving environments.

    Prior to joining Proofpoint, Mr. Westman held senior leadership positions at Check Point Software Technologies, SonicWALL, and Extreme Networks.

    Why Attend.

    This virtual boardroom will also equip you with real-life case studies of how other businesses are obtaining practical approaches to supply-chain risk management, as well as the steps you could consider in order to gain visibility and control of the business risk. We will also address: 

    • Attain a practical approach to supply-chain risk management
    • An overview of how to obtain visibility and control of business risk within your organisation
    • Gain clarity on the first steps to mitigating supply chain risk
    • Analysis into detecting, analysing and blocking advanced threats delivered through malicious attachments and URLs, before they reach your employees
    • In-depth examination of how supply chain visibility can reduce complexity and boost efficiency
    • Insights into developing and delivering targeted education to act as your best line of defence against social attacks
    • Tangible tips and guidance on how to reduce risk and protect users across the whole organisation

    Solution Partner.

    Proofpoint is a leading cybersecurity company that protects organizations’ greatest assets and biggest risks: their people. With an integrated suite of cloud-based solutions, we help companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organisations of all sizes, including more than half of the Fortune 1000, rely on us for people-centric security and compliance solutions that mitigate their most critical risks across email, the cloud, social media, and the web.

    “Solid event to share experiences with peers. Reconfirming & reassuring.”

    Global Head of Analytics, Shell