[On-Demand Webinar]

3 Ways to Detect and Prevent Man-in-the-Middle Attacks

InformationWeek_Webinar_Image

Supply chain cyberattacks are on the rise and threat actors are using multi-phased strategies to access legitimate communications between parties and gain entry into systems.  Vendor email compromise (VEC), a form of Man-in-the-middle (MitM) attack commonly used in supply chain attacks, detection can be difficult. With 58% of organizations reporting an attempted supply chain attack within the past year, and 75% falling victim to an attack, understanding the techniques and mitigation strategies is vital to preventing impact to an organization. 

Watch this on-demand webinar, as cybersecurity expert Matt Petrosky, VP of Product Management at GreatHorn Email Security discusses:

  • 2021 Supply Chain, MitM and Vendor Email Compromise Attack Trends
  • Dissection of 3 Examples and Techniques Used
  • Requirements and Considerations to Detect
 

View the recording and Download the slide deck.

For more information, please see our Privacy Policy. If you prefer not to receive marketing emails, you can opt-out of all marketing communications or customize your preferences here.