Training

Account Takeover Fraud , Business Email Compromise (BEC) , Cybercrime

Preparing CISOs for Emerging Email Threats in 2022 and Beyond: Featuring Gartner® Analyst and Fox

Preparing CISOs for Emerging Email Threats in 2022 and Beyond: Featuring Gartner® Analyst and Fox

44% of all cybercrime losses reported to the FBI in 2020 were due to business email compromise. These threats are designed to evade traditional email defenses, including secure email gateways, because they are often text-based and appear to come from trusted senders. As a result, they defraud employees into paying fake invoices, wiring funds to attackers, or inadvertently sharing sensitive information. But they can be stopped.

Join this webinar to hear from Fox and Gartner® Analyst:

  • Dean Perrine, Deputy CISO at Fox Corporation, will share how he supplemented his secure email gateway with an API-based approach to address business email compromise and advanced internal account takeover threats. He will also share best practices in preventing BEC attacks, and the results that he achieved.
  • Dean Perrine, Deputy CISO at Fox Corporation, will also share his roadmap to simplify his email architecture, provide better efficacy, enhance the end-user experience, and reduce his overall total cost of ownership for email security.
  • Mark Harris, the co-author of the 2021 Gartner® Market Guide for Email Security, will kick off the session by sharing key market trends for email security and providing his recommendations for the future.

Please attend live. This webcast will only be available on-demand for a limited time.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Webinar Registration

This webinar is available OnDemand.

View Now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.