Proofpoint

Cybersecurity eSummit Protect Your No. 1 Threat Vector: BEC & EAC

Watch On-Demand

The financial losses associated with Business Email Compromise (BEC) and Email Account Compromise (EAC) continue to rise. The FBI reported losses of almost $1.7B in 2019 alone.

Join top industry leaders for an online summit of in-depth talks and interactive discussions on the latest in cybersecurity trends for Business Email & Account Compromise and how you can better manage this billion-dollar problem in your organization.

*First two sessions are eligible for CPE credits with ISC(2). To submit your credits, please click here.



What is BEC and EAC?

    • Business Email Compromise (BEC) - BEC attacks ask the victim to send money or personal information out of the organization. Attackers do this by spoofing a person in authority, such as a CEO or VP of Finance.
    • Email Account Compromise (EAC) - EAC can occur if a threat actor successfully tricks a victim into providing their credentials or accesses an account through other means. If an account is compromised, it can be used to move laterally inside an organization, steal data, or fraudulently communicate with your business partners or customers.

Click and watch any of the sessions on-demand below.

Keynote On-Demand
Case Study On-Demand
Live Demo On-Demand




Keynote: Cybercriminal Minds - Evolving BEC Attack Tactics During Shelter-in-Place

Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint
Sherrod DeGrippo, Sr. Director of Threat Detection & Research at Proofpoint

COVID-19 not only impacts our lives but also affects cyber threat landscape, which continues to be dominated by coronavirus-related activities. Proofpoint Threat Research team has observed more and more business email compromise (BEC) and email account compromise (EAC) scams leveraging coronavirus lures. In addition, attackers have come up with more sophisticated tactics to trick their targets into making fraudulent wire transfer.

Join our speakers Ryan Kalember, EVP of Cybersecurity Strategy, and Sherrod DeGrippo, Sr. Director of Threat Research & Detection, of Proofpoint to learn more about:
    • The current state of COVID-themed BEC/EAC scams
    • New BEC tactics targeting organization’s supply chain
    • The differences between BEC and other tactics, such as malware and cred-phish
    • Why threat actors choose a certain attack tactic and the psychology behind criminal minds


Client Case Study: Defending Against Email Fraud

Kelty MacEachern, Security Operations Analyst at Finning International

Sara Pan, Sr. Product Marketing Manager at Proofpoint

Business Email Compromise (BEC) and Email Account Compromise (EAC) scams have cost the victimized businesses over $26 billion since 2016. Gartner even predicts that these new forms of email threats will continue to double each year to over $5 billion through 2023. Unfortunately, there’s no silver bullet for BEC and EAC. These human -activated threats require an end-to-end solution that addresses all attack tactics.

Join us for this one-on-one client interview to hear from your peer about:
    • Their experiences with the changing landscapes of BEC and EAC
    • The challenges they face
    • How they tackle this $26 billion problem
    • How success was measured


BEC Live Demo: Detect and Block BEC Scams with Proofpoint

Thomas O'Leary, Email Fraud Defense Product Specialist at Proofpoint

Business Email Compromise (BEC) often starts with an email in which attackers pretend to be someone the victim trusts. The message makes a seemingly legitimate business request that usually involves wire transfer or financial payment. Common BEC tactics include domain spoofing, display name spoofing, and lookalike domains. None of these emails carries malicious payload, and they are narrowly targeted at few people within an organization. Therefore, it is hard to detect these new forms of email threat.

Join this live demo to learn more about how Proofpoint:
    • Identifies common BEC attack tactics
    • Detects and blocks impostor emails
    • Provides actionable visibility and threat insights
    • Protects your brand and prevents fraudulent use of your domain
    • Trains your end users into your last line of defense

Session Speakers

Kelty MacEachern, Intermediate Security Operations Analyst at Finning International

Kelty works currently at Finning International as an Enterprise Security Operations Analyst. She professional background is IT with a wealth of knowledge as a security analyst. Her specialties are Security tools, Vulnerability Management, Threat Hunting, SIEM Integration, Firewalls, End point protection and incident response.

Ryan Kalember, EVP of Cybersecurity Strategy at Proofpoint

With almost 20 years of professional experience in the information security industry, Ryan has provided cybersecurity counsel to global government delegations including Jordan, North Macedonia, Peru, and Spain. He also works with the National Governors Association and is a board member of the National Cyber Security Alliance and the Cybersecurity Technical Advisory Board.

Sherrod DeGrippo, Sr. Director of Threat Research & Detection at Proofpoint

Sherrod leads a worldwide malware research team to advance Proofpoint threat intelligence and keep organizations safe from cyberattacks. With more than 15 years of information security experience, she directs her 24/7 team to investigate advanced threats, release multiple daily security updates and create scalable threat intelligence solutions.

Thomas O'Leary, Email Fraud Defense Product Specialist at Proofpoint

Thomas specializes in email authentication and preventing identity deception of Proofpoint's customers' brands and domains. He has years of experience in Professional Services where he has helped hundreds of organizations implement DMARC, create better email governance practices, and the enforcement of the aforementioned policies as part of a layered defense strategy.

Sara Pan, Sr. Strategist for BEC & EAC at Proofpoint

Sara is a product strategist from Proofpoint and has been a product evangelist in the cybersecurity industry for more than 7 years. She has presented at industry events and webinars- topics spanning across endpoint, data, and email security.

Section 4: Charter

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Section 5: Frequently Asked Questions

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Section 6: Additional Content

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Section 7: Additional Content

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Section 8: Additional Content

"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

© All Rights Reserved. Privacy Policy