Supply chain hacks rose 42% in Q1 2021 compared to the prior quarter, and nearly 140 organizations reported being impacted by supply chain attacks in Q1, according to the Identity Theft Resource Center.
If attackers’ success in executing supply chain attacks, business email compromise, and financial fraud are dependent on exploiting your partners’ vulnerabilities — yet you have little control or visibility over your partners’ security — how can you still effectively protect your organization? The answer lies in applying zero trust principles to all communications, across your organization’s entire network.
Listen to learn:
- how your partner social graph results in increased risk surface area;
- why email security plays a critical role in establishing a zero trust architecture, that can be extended to your business partners and suppliers; and
- how to leverage email security to prevent targeted cyber attacks.
Chief Technology Officer
Phil Syme has 22 years of information technology experience. His areas of expertise include system architecture, data processing at scale, and cloud technologies. Phil was previously a Chief Engineer at Next Century Corporation, co-founder and Principal Engineer at eSymmetrix, and co-authored two introductory programming books. He holds a B.S. in Mathematics and Computer Science from Carnegie Mellon University School of Computer Science.
Senior Product Manager and former CISO at GUESS?
Kevin Wilson is a Sr. Product Manager at Area 1 Security. Throughout his 14 year in Cyber Security, Kevin has been an Analyst and Engineer in various organizations such as the U.S Navy, First Data, and Lowe’s. Previously he served as the Global Information Security Officer at Guess? Inc as well as a Product Manager for McAfee.