Date: Wednesday, December 11th at 11am PT / 2pm ET
Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, to find out how third-party phishing attacks operate, how you can spot them, and what defenses do and don't work against them. You will see:
Joe in accounting is pretty cyber-savvy. He doesn’t fall for basic phishing emails with masked URLs or phony password reset requests. But what happens when Joe gets an email from a trusted third-party vendor disputing a recent payment and demanding action? If that third-party vendor has been compromised it could very well be the bad guys sending Joe a spear-phishing attack from the vendor’s domain. And if it is, you could be in trouble. Big trouble...
Because third-party phishing attacks look like legitimate emails from your vendors’ domains, traditional defenses often don't work against them or they are severely weakened. Your only defense is a strong human firewall. Find out how third-party phishing attacks operate, how you can spot them, and what defenses do and don't work against them.
About the presenter: