Q1. What emerging technologies or approaches do you foresee having the biggest impact on email security, especially around email authentication and verification?
Email has always been, and continues to be, the main delivery mechanism for social engineering, malware, and credential attacks. Email-based malware and credential attacks remain the number one option for all levels of adversaries, and they don’t require a high level of technical sophistication to carry out. And because these attacks are designed to exploit the human factor and not a vulnerability that can be patched, there is almost no doubt they will endure as a favored tactic.
However, social engineering has evolved in less predictable directions. Different technologies have enabled the payloads to evolve such as deepfaked audio and video, AI-assisted translations and personalization. These new technologies are amplifying their impact to commit financial fraud, account takeovers, and more.
While it’s still a relatively small part of the overall threats that malicious actors attempt to deliver to our customers, we are starting to see phishing attempts that can use AI to craft convincing messages to cleverly translate to different languages using AI. Deepfaked audio and video can impersonate someone in a seemingly urgent message coming from an executive or your own boss.
These personalization tactics, coupled with AI-powered content creation, make these fraudulent emails far more believable and dangerous. Combating them requires advanced solutions that can detect them. We have a number of protections in place, and we are always working on new innovations that stay ahead of threat actors.
Q2. How might the rise of AI-powered cyber-attacks change the landscape of threat detection and response over the next few years? How has Proofpoint evolved its strategies to help customers address the threat?
AI-based attacks currently make up a very small percentage of our threat telemetry. If you take Business Email Compromise (BEC) attacks, which was the leading cause of financial loss for organizations last year, the hardest part for threat actors is managing money mules, opening bank accounts and creating infrastructure like lookalike domains.
But, as I mentioned, we do see these new technologies enabling threat actors in new ways. We see GenAI being leveraged for nefarious means, allowing BEC actors, who until recently could only focus on social engineering attacks in English or a few other languages, to craft well-written phishing emails in literally any language. With ChatGPT, we have seen a notable uptick in campaigns targeting Japanese and Korean companies in local language and observing local business customs, which effectively has opened up new virgin territories for attackers.
On the defense front, AI has become a critical part of a detection ensemble, especially for pure social engineering attacks without a traditional payload like a link or attachment. AI’s concept of explainability also provides much-needed analysis and threat identification at scale that can be used by security professionals to minimize breach risk and enhance security posture.
AI and ML have been in Proofpoint’s DNA since our inception, and we continue to build on our AI and ML heritage by investing and innovating around the latest attacker trends to give customers the best efficacy against the ever-changing threat landscape. And as we secure trillions of human communications every year, we don’t have to worry about running low on training data.
Q3. What opportunities will customers and other organizations at Black Hat USA 2024 have to meet with and learn more about Proofpoint's plans and strategies? What can they expect to see and hear from Proofpoint at the event?
The fragmentation across email security and data protection solutions allows threat actors to win, again and again and data to be exfiltrated. Organizations need a simple, unified and effective way to catch every threat, every time, every way a user may encounter it, using every form of detection. Proofpoint has redefined human-centric security, which Gartner has identified as one of three strategic priorities for CISOs in 2024 and 2025.
In pioneering human-centric security, we’ve brought together previously disconnected functionality to accomplish two critical goals. The first is helping organizations protect their people from targeted attacks, impersonation, and supplier risk, along with making their people more resilient and cyber aware. The second is to help them defend their data from users that put it at risk, whether by mistake or intentionally.
We’re focusing on giving our customers the best solution to solve this problem leveraging modern AI technologies, behavior analysis and threat intelligence. We’re delivering deeper, more comprehensive technology integrations with our peers across architectural domains, from SASE/SSE and XDR on the infrastructure side to identity and security operations. We are building upon our existing partnerships —including Palo Alto Networks, CrowdStrike, Microsoft, CyberArk, Okta and many more—to enhance outcomes for our joint customers.
Our team values the direct connections made with customers, prospects, and partners, and we’re looking forward to face-to-face meetings in our private meeting rooms, a night out at our private executive dinner, and discussions at our booth #1740 to learn more about our human-centric approach to cybersecurity through engaging product presentations, live demonstrations, giveaways and more.