Business Email Compromise (BEC)
Category

Business Email Compromise (BEC)

Phishing schemes and e-mail compromises are nothing new. However, the methods of deception and their complexity continue to evolve, circumventing spam filters and other proactive security measures. Learn more about how different types of e-mail threats are being neutralized.

Email Security, Phishing

Resolve and Evolve: Machine Learning for Email Threat Protection

Dena Bauckman - ZixCorp  •   • 

Start this Session

How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks

Myke Lyons - ServiceNow  •   • 

Start this Session

Stop Attacks Before They Reach the Inbox

Denis Ryan - Proofpoint  •   • 

Start this Session

Business Email Compromise: Building a Cyber Resilient Strategy to Crack Down on Attackers

Session In Development  • 

 • 

Preview this Session

Phishing Attacks: How Costly Can They Be for Enterprises?

Session In Development  • 

 • 

Preview this Session

Business Email Compromise: Protecting the Enterprise

Session In Development  • 

David Stubley - 7 Elements  •   • 

Preview this Session

Making Email Safe Again: How to Empower Staff to Share Data Via Email

Session In Development  • 

Sudeep Venkatesh - Egress  •   • 

Preview this Session

Building a Cyber-Resilient Program for Email Security: A Holistic Approach

Anoop Das - Mimecast  •   • 

Start this Session

Identity Deception and Social Engineering Attack Vectors - Email Makes It Easy!

Andrew Coyle - Agari  •   • 

Start this Session

Case Study: Look-a-Like Domains, Phishing and Procurement Fraud

Session In Development  • 

Allan Stojanovic - University of Toronto  •   • 

Preview this Session

Email: Still A Top Threat Vector!

Brent Maher - Johnson Financial Group  •   • 

Start this Session

How to Combat Targeted Business Email Compromise Attacks

Markus Jakobsson - Agari  •   • 

Start this Session

Email Fraud - An Inside Look at the Fraudsters' Strategies and Tactics

Dan Hoffman - Agari  •   • 

Start this Session

WannaCry, Petya & the Global Ransomware Epidemic: How to Protect Your Organization

Darius Goodall - Barracuda  •   • 

Start this Session

Session Contributors

Allan Stojanovic

Security Architect and Analyst, University of Toronto

Read Bio
Andrew Coyle

Security Solutions Architect, Agari

Read Bio
Anoop Das

Enterprise Manager, Middle East and India, Mimecast

Read Bio
Brent Maher

CISO, Johnson Financial Group

Read Bio
Chris Richter

SVP, Managed Security Services, Level 3 Communications

Read Bio
Christopher Pierson

Chief Security Officer and General Counsel, Viewpost

Read Bio
Dan Hoffman

Global Director of Solutions Architects, Agari

Read Bio
Darius Goodall

Director, Product Marketing - Security Products, Barracuda

Read Bio
David Stubley

CEO, 7 Elements

Read Bio
Dena Bauckman

VP of Product Management, ZixCorp

Read Bio
Denis Ryan

Senior Director, Field Sales-Email Fraud, Proofpoint

Read Bio
Denyette DePierro

VP & Senior Counsel - Center for Payments & Cybersecurity, American Bankers Association

Read Bio
Jeff Hall

Regional Sales Manager, ZixCorp

Read Bio
John Wilson

Field CTO, Agari

Read Bio
Jon Clay Sr

Director, Global Threat Communications, Trend Micro

Read Bio
Kevin Epstein

VP - Product Marketing, Proofpoint

Read Bio
Maria Ramirez

Head Deputy, Cyber Crime Division, Los Angeles County District Attorney's Office

Read Bio
Matthew Braverman

Supervisory Special Agent, Washington Field Office, FBI

Read Bio
Mike Versace

Global Research Director, IDC Financial Insights

Read Bio
Myke Lyons

Global Director of Security Transformation, ServiceNow

Read Bio
Neil Hammet

Head of Email Security Products, Proofpoint

Read Bio
Stacy Shelley

Vice President, PhishLabs

Read Bio
Sudeep Venkatesh

Chief Product Officer, Egress

Read Bio
Wes Dobry

Principal Security Architect, Agari

Read Bio
William Ng

Supervisory Special Agent - Cyber Crime, San Francisco Division, FBI

Read Bio

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cybered.io, you agree to our use of cookies.