Protecting Yourself From Your Supply Chain: A CISO Panel on Email Security

While you may be confident in your own email security, the truth is that your security is only as good as the security of your partners and vendors. Attackers have pivoted their strategy to focus on exploiting these trusted relationships to launch supply chain attacks, including payment, invoice, and RFQ fraud. In many cases, they compromise real vendor email accounts and use real emails to divert money and steal valuable IP. And with traditional email security, there is little you can do to stop it.

Worried yet?

View this webinar to learn how to identify and stop supply chain threats, including vendor email compromise. Dr. Eric Cole, Former CTO of McAfee and Virtual CISO, and Mike Britton, CISO at Abnormal Security, provide insights into how they’ve prevented these attacks from targeting companies and damaging their reputation.

Discussion topics include answers to the following questions:

  • What are the latest trends in supply chain fraud and vendor email compromise attacks?
  • What are the risks from compromised vendor attacks?
  • How do threat actors carry out supply chain attacks?
  • Why do existing tools fail and what solutions exist?

Fill out the form to view the webinar on-demand.

After viewing this webinar, you are eligible for 1 CPE credit through (ISC)².

Watch Now

Related Resources

B Vendors as Your Largest BEC Threat 07 07 22
Threat actors have shifted their strategy—moving away from internal impersonation and instead focusing on impersonating third parties. Watch the webinar to learn more about this new threat: financial supply chain compromise.
Watch Now
Report fscc cover
For years, executives were the go-to impersonated party in business email compromise attacks. Now, threat actors are opting to impersonate vendors and suppliers instead.
Download Now
H1 threat report cover
From June-December 2021, Abnormal Security discovered that nearly all types of advanced email attacks grew in frequency, with a new trend of phone fraud using email as the first contact.
Download Now
Threat report 3
Read the Q1 2021 threat report to learn the latest on vendor email compromise, including which scams are most successful and why the volume of attacks has grown so significantly.
Download Now
Threat report 2
Attackers are leveraging social engineering to drive significantly higher engagement and account takeover. In the Q2 2021 threat report, Abnormal found that attacks are growing at significant rates, as threat actors leverage social engineering strategies to bypass SEGs and drive engagement.
Download Now
Threat report 1
Cybercriminals upped their game over the last quarter—increasing the number of credential phishing attacks and account takeover attempts. In our quarterly threat report, Abnormal Security discovered significant increases in the number of brute force attacks and impersonation attempts.
Download Now
B 03 25 22 CISCO Guide to VEC
Supply chain compromise attacks can cause substantial financial loss through invoice or payment fraud. Learn how and why attackers leverage compromised accounts from vendors to launch attacks that are specifically designed to bypass traditional email security.
Download Now