In a world where scammers increasingly exploit human error over technology as a means of gaining initial access, digital supply chains built on trusted business relationships have come under attack. Threat actors see these relationships as a vulnerability they can profit from, posing as your vendors through email to target your people and put your organization at risk.

Attacks that compromise and impersonate your suppliers, such as domain spoofing or vendor email compromise (VEC), can result in significant financial losses and damage to your brand's reputation. In fact, data breaches involving supply chain compromise cost more than $4.75 million on average, 11% more than those that don't (according to the IBM 2023 Cost of a Data Breach Report).

In this one-hour session, we will discuss:

•  The latest impersonation tactics used to weaponize your suppliers
•  The role of human-centric security in mitigating and managing supplier risk
•  How to build continuous detection into your strategy to stop attacks before they start

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
speaker photo
Brette Petersen
Product Marketing Manager, Proofpoint

Brette has several years of experience bringing technical products to market, with business expertise in multiple industries spanning Manufacturing, Aviation, Ecommerce, and Cybersecurity. At Proofpoint, Brette works directly with product developers, threat researchers, and end-users to build advanced, people-driven email security solutions. Her special interests include ransomware prevention and preparation. Brette has a bachelor's degree from the University of Nebraska and a master's degree in business from the University of Utah.

speaker photo
Tom Bechtold
Digital Events Director, SecureWorld
Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.