Securing Business Emails From Attack: Discovering the Weakest Link
Email remains a key vector for attacks, with business email compromises, which often involve impersonating a senior executive to request a money transfer, a growing concern.
BEC attacks often are not detected because the transaction appears legitimate. CISOs have searching for better ways to mitigate the risk.
This session reviews:
- The weakest link in business email security;
- How to better articulate the threat of email spoofing to executives;
- Techniques to plug gaps in email security.