Business email compromise attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. This session reviews why email spoofing works, the...
The FBI reports that 22,000 businesses worldwide have been victims of Business Email Compromise (BEC), with recent losses exceeding $5B. In virtually every one of these cases, attackers fraudulently extracted funds from financial institutions using advanced social engineering and email deception tactics.
In this...
It's a growing epidemic: Ransomware, advanced persistent threats and phishing attacks are responsible for hundreds of millions of dollars in damage due to lost productivity, tainted credibility and worse - lost revenue. As attackers plan increasingly more sophisticated attacks, your organization needs to know how best...
Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. This session will review why email spoofing...
In this session, Trend Micro will review its own research into Pawn Storm (a.k.a., APT28, Fancy Bear, Strontium, etc.), which exposes the scope and scale of the cyber-espionage attacks the cyber tradecraft of those who wage these attacks. Trend Micro's researchers have observed activity dating back to 2004, with...
Despite the proliferation of social networks and messaging apps, email remains the primary means of communication today. Unfortunately, it also remains a persistent threat vector for cybersecurity abuse. We see these evil emails everywhere: at work, at home and in the news, attempting to sell something, or steal...
This session will review the latest trends in ongoing and emerging cyberthreats posed by cybercriminals. FBI Supervisory Special Agent Matt Braverman will walk through the latest tactics being used in ransomware, business email compromise exploits and other cyber-extortion schemes, and discuss the FBI's stance on how...
Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. This session will review why email spoofing...
Cyber-extortion has reached new proportions, with a wide variety of methods, such as distributed-denial-of-service attacks and ransomware variants, being used to extort individuals and organizations. Ransomware-DDoS hybrid attacks, like Cerber, have showcased how attackers have added DDoS capabilities to ransomware....
Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways...
How Prepared is Your Enterprise to Defend Against Phishing
Attacks?
From the Anthem breach to the compromise of the U.S. Office of
Personnel Management, phishing attacks have been at the heart of
many high-profile security incidents - including the most recent
attacks at Seagate and Snapchat. Spear...
Cybercriminals love email, and for good reason. Email lacks authentication, yet it's an essential part of modern business. It should come as no surprise that email remains the number one vector for cyber fraud.
In this session get a behind-the-scenes reveal into email examples of malicious, highly targeted messages...
Security safeguards and controls can only get you so far. At some point, an employee is going to click, open something, or take action on a request that is fraudulent and bypass all of these controls. We will discuss both business email compromise fraud and account takeover in depth as we consider the...
Business Email Compromise phishing attacks, including the recent surge of IRS W-2 scams, have never been more prevalent. Why? Because they work.
These attacks, which often impersonate company executives, are actively targeting organizations large and small. When successful, BEC attacks lead to large losses due to...
The increase in data breaches and external threats has reminded us of the importance of securing emails - and just how big a problem business email compromises can be. Organizations need to be confident that the millions of emails leaving their network each day are protected for anywhere and from any device, whether...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.