ISC2 Think Tank: The Evolution of Email Threats: How Social Engineering is Outsmarting Traditional Defenses

Source URL: https://www.brighttalk.com/webcast/5385/638538
Source: ISC2 Think Tank
Title: The Evolution of Email Threats: How Social Engineering is Outsmarting Traditional Defenses

Feedly Summary: A staggering 74% of all breaches involve the human element, proving that cybercriminals are relentlessly exploiting users through sophisticated email-based social engineering attacks. While organizations have invested in email authentication, advanced threat detection, and security awareness training, attackers continue to adapt – leveraging techniques like Business Email Compromise (BEC), Telephone-Oriented Attack Delivery (TOAD), and benign conversation hijacking to infiltrate businesses. On April 24, 2025 at 1:00 p.m. Eastern/ 10:00 a.m. Pacific, join Proofpoint and ISC2 when we will explore: • How attackers manipulate human trust – why social engineering tactics like BEC, TOAD and email conversation hijacking continue to be effective. • The gaps in traditional email defenses – how attackers evade MFA, exploit supplier relationships, and impersonate trusted senders. • Best practices to reduce human-targeted risk – suggested tips and recommendations to integrate a holistic email security strategy. Don’t miss this exclusive discussion with industry experts to gain actionable insights into protecting your organization from today’s most advanced email-based threats.

AI Summary and Description: Yes

Summary: The text highlights the significant role of human factors in cybersecurity breaches, focusing on email-based social engineering attacks. It emphasizes the adaptation of cybercriminal techniques and provides an upcoming discussion on strategies to mitigate risks.

Detailed Description: The content discusses the substantial impact of human error and manipulation in cybersecurity, with a specific emphasis on social engineering tactics. Key points include:

– **High Breach Incidence**: 74% of all cyber breaches are attributed to the human element, underscoring the vulnerability of users to manipulation.
– **Adaptive Attack Techniques**: Cybercriminals are increasingly utilizing sophisticated methods such as:
– **Business Email Compromise (BEC)**: Fraudulent schemes aimed at tricking individuals into transferring money or sensitive information.
– **Telephone-Oriented Attack Delivery (TOAD)**: A technique that involves phone calls to manipulate victims into revealing personal information.
– **Benign Conversation Hijacking**: Seizing conversations to mislead users into taking harmful actions.
– **Importance of Email Security**: Despite investments in email authentication and threat detection, attackers find ways to outsmart these defenses through:
– Evasion of Multi-Factor Authentication (MFA)
– Exploitation of supplier relationships
– Impersonation of trusted senders, which erodes user trust.
– **Upcoming Discussion**: Scheduled for April 24, 2025, featuring experts from Proofpoint and ISC2, the session aims to cover:
– The psychological manipulation involved in social engineering.
– Identifying and addressing weaknesses in traditional email defenses.
– Providing actionable best practices to foster a more secure email environment.

By attending this discussion, professionals can gain valuable insights and practical recommendations geared towards enhancing organizational security against prevalent email-based threats.