Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

#ExpertInsights 10: Business Email Compromise and Email Fraud Defense - Part 2

#ExpertInsights 10: Business Email Compromise and Email Fraud Defense - Part 2

FromProtecting People


#ExpertInsights 10: Business Email Compromise and Email Fraud Defense - Part 2

FromProtecting People

ratings:
Length:
22 minutes
Released:
Jul 22, 2021
Format:
Podcast episode

Description

Fraudsters who perpetrate BEC and various other types of email scams are a serious and continuous threat to businesses today. In 2019, there were 26.2 billion dollars in reported losses from these kinds of malicious malware attacks.


For part two of our Expert Insights into Business Email Compromise (BEC) and email fraud protection, host Sherrod DeGrippo leads a lively discourse with Robert Holmes, Sr. Director of Threat Research and Detection, and Sam Scholten, CISSP, and Staff Email Fraud Researcher, both of Proofpoint — a company at the forefront of using AI and machine learning for radical, comprehensive threat protection.


Here's a sneak peek:
- The small but crucial differences between DDoS extortion and a BEC attack.
- The next generation of how Proofpoint is stopping these threats with deep analysis of every email for metadata signs of intrusion.
- Fascinating samples of previous attacks and highly creative threat actors who leveraged social cues to launch an attack.
- Successful scams take advantage of human nature and the fundamental vulnerability of individuals.

To hear more episodes like this one, subscribe to Protecting People on Apple Podcasts, Spotify, or your preferred podcast platform.
Released:
Jul 22, 2021
Format:
Podcast episode

Titles in the series (100)

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.