Anti-Phishing, DMARC , Business Email Compromise (BEC) , Email Security & Protection

Business Email Compromise: Trends and Predictions

Expel's Hencinski and Datasite's Peterson on Why BEC Is 'Public Enemy #1'
Jon Hencinski, director - detection and response, Expel; Theodore Peterson, vice president - information security, Datasite

According to a new threat report from Expel, business email compromise should now be viewed as "public enemy #1." Jonathan Hencinski of Expel is joined by Theodore Peterson of Datasite to support that claim and discuss how best to strategize against these schemes.

In this video interview with Information Security Media Group, Hencinski and Peterson discuss:

  • Why BEC should be considered "public enemy #1";
  • Threat actors and their common tactics;
  • Tips for how to better detect and defend against these schemes.

Hencinski is responsible for the day-to-day operations of Expel's security operations center and detection and response engineering. He oversees how Expel recruits, trains and develops security analysts. He has over a decade of experience in the areas of SOC operations, threat detection and incident response. Prior to Expel, he worked at Mandiant and BAE Systems and was an adjunct professor at The George Washington University.

Peterson, who has over 28 years of information security experience, joined Datasite's team in July 2019. He has experience in project, process, implementation, and security management from nonprofits to Fortune 50 organizations. Prior to joining Datasite, he was the acting director of information security at SPS Commerce.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.