- the seven common supply chain-based attack methods including partner spoofing, business email compromise, new domain campaigns, malicious URLs, and more;
- real examples of supply chain phishing attacks and the methods attackers use at every step of the cyber kill chain; and
- the advanced, cloud-native email security techniques that proactively block these attacks in progress.
Senior Threat Researcher
Area 1 Security
Juliette Cash is a passionate information security professional with 15 years experience in technical consulting, computer network operations, and cyber threat analysis and research. She has dedicated her career to tracking and defending against highly sophisticated threats to protect both the public and private sectors, including the United States Intelligence Community and the world’s top Fortune 500 companies. As Area 1’s Senior Threat Researcher, Juliette leads the charge in advanced hunting, collection operations support, technical analysis of intrusion activity, and the development of innovative detection techniques that defend against complex and evolving security threats.
Director of Sales Engineering
Area 1 Security
Area 1 Security’s Dominic Yip brings over 15 years of networking and security systems engineering expertise, including key engineering roles for Cisco and IronPort. At Area 1, he ensures that some of the world’s most sophisticated organizations — including Fortune 500 banks, insurance companies, airlines and healthcare providers — are protected from targeted phishing attacks.