- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Join us for the highly anticipated third episode of the "No Suits, No Ties" series! If there is one incident type that many IT Administrators and those performing security roles have to investigate routinely it is phishing.
The security tools and controls for detecting and preventing phishing are leveraging AI and becoming better and more effective at stopping these threats before they make it to end users.
Due to this attackers need to constantly evolve their techniques to avoid detection and improve the chances of their crafted email messages getting through to the intended victims and getting them to interact.
In a recent case investigated by CPIRT we encountered a novel approach to bypassing common phishing controls. In this session, we will examine a spear phishing case involving third party compromise and using the third party tenant to exploit trust.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY