Elias Samarani

Senior Security Consultant

Proofpoint - Middle East

Biography

Mr. Elias Samarani serves as a senior security consultant for the Middle East at Proofpoint. He has more than twelve years of experience in the security industry, having previously served in various major cybersecurity roles for service providers, systems integrators, and consulting firms. His passion for technology and his broad technical expertise in the areas of network security, malware, digital forensics, cloud, and managed security services equip him with the skills necessary to quickly assess the most complex environments and develop strategic people-centric security solutions.

Speech Topic & Synopses
A People-Centric Approach to Managing the Risk of Insider Threats and Business Email Compromise

The way we work is changing, and so are today’s cyber attacks. Insider Threats are on the rise, so too are email fraud attacks. Whether it’s careless users, disgruntled employees, compromised accounts, or supply chain attacks, it’s critical to gain visibility into the different types of insider threats and email fraud attacks your organisation faces, and how a modern people-centric approach can help you manage the risk of data breaches and financial loss.

 

Traditional perimeter-based security solutions do not provide the visibility or context that security and IT teams need to reduce this risk. These new threats call for a new, integrated approach to cybersecurity. To protect your people, data, and brand, today’s defences must work where your people do. In this talk, we’ll explore the unique new risks you face and how to combat them, including:

  • How to easily surface your most attacked people, groups and VIP’s and see where to apply mitigating controls.
  • New email fraud tactics targeting organization’s supply chain and how DMARC verification and authentication is critical in protecting your business email.
  • How to reduce response time by accelerating investigations and using automation to respond to time sensitive issues.
  • The types of insider threat profiles and how to address them.