Third-party phishing: The new spear-phishing attacks that traditional defenses just don’t stop

Thursday, December 5, 2019

2:00 p.m. ET / 11:00 a.m. PT

Joe in accounting is pretty cyber-savvy. He doesn’t fall for basic phishing emails with masked URLs or phony password reset requests. But what happens when Joe gets an email from a trusted third-party vendor disputing a recent payment and demanding action? 

If that third-party vendor has been compromised it could very well be the bad guys sending Joe a spear-phishing attack from the vendor’s domain. And if it is, you could be in trouble. Big trouble...

Because third-party phishing attacks look like legitimate emails from your vendors’ domains, traditional defenses often don't work against them or they are severely weakened. Your only defense is a strong human firewall. Find out how third-party phishing attacks operate, how you can spot them, and learn what defenses do and don't work against them.


Join us and Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, to see:

  •  Real third-party phishing schemes
  •  Why traditional defenses won’t stop them
  •  Ways to identify a third-party attack
  •  How to build a strong human firewall
  •  Actionable steps you can take now to protect your network
Roger Grimes
Data-Driven Defense Evangelist
View Biography

Registration details:

By registering you are accepting our Privacy Policy and Terms of Use.

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.

(*) denotes required form field(s)