Email fraud is one of today's most common—and most costly—cyber threats. It’s also the most effective means to infiltrate just about any company. There are many ways the bad guys go about compromising the network and getting what they want: spear phishing, BEC/CEO fraud attacks, W-2 scams, ransomware… the list goes on and on.

What’s the best way to defend your organization from business email compromise (BEC), social engineering, and other email spoofing attacks?

Join our experts for a deep dive into real world email fraud examples and a discussion of best practice defense strategies. We’ll share:

•  Common identity deception tactics cyber criminals use to target your employees, business partners, and customers
•  How fraudsters use social engineering to reach the right person at the right time
•  How to identify and stop email fraud attacks before they reach the inbox

Be sure to submit your questions for our presenters to answer during the live program.

Can't attend live? Not to worry. We record all webcasts and make them available to view at your convenience.

Earn 2 CPE credits for live or on-demand viewing.

Generously Supported By:

supported by logo
protecting people report image
speaker photo
Ryan Terry
Manager, Product Marketing, Proofpoint

Ryan has overseen product marketing for various products within the cybersecurity space for more than six years. He currently leads product marketing for Proofpoint Email Fraud Defense and the company’s email fraud and Business Email Compromise (BEC) solution.

speaker photo
Stephen Dougherty, CRE
Financial Investigator (Contractor), United States Secret Service - Global Investigative Operations Center (GIOC)

Stephen is a cyber-enabled financial crime investigator contracted to the United States Secret Service Global Investigative Operations Center (GIOC). He has a decade plus experience investigating financial crimes with a cyber nexus from both the public sector and private sector. Currently, he is the U.S.S.S. point person for Business Email Compromise cases.