The Modern CISO’s Framework for Identifying, Classifying and Stopping Email Fraud

The Modern CISO’s Framework for Identifying, Classifying and Stopping Email Fraud

Business email compromise (BEC), also known as email fraud, is one of cybersecurity’s costliest and least understood threats. As BEC schemes have evolved, industry nomenclature has outlived its usefulness. Without a framework to describe and break down BEC attacks—let alone conceptualize them—researching and managing the threat is difficult, if not impossible. The Proofpoint Email Fraud Taxonomy is designed to help security professionals better identify, classify and block this ever-costly threat. Download this guide to learn:

  • How to classify BEC attacks using identity, deception and theme
  • Similarities and key differences between invoicing fraud and payroll redirects
  • The essential human traits threat actors exploit in lures- and task-based attacks
  • Why advance-fee fraud still works

Download your copy of Breaking Down BEC now.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.