Training

2018 London Security Summit , Business Email Compromise (BEC) , Email Security & Protection

Anatomy of a BEC Attack

Anatomy of a BEC Attack

This session looks at two real-life case studies, with different outcomes from the same initial starting point for two companies. The first led to £140k loss due to malicious invoicing; the second led to data exfiltration and reputational damage (as well as ICO reporting due to GDPR).

See Also: On Thin ICES: Augmenting Microsoft 365 with Integrated Cloud and Email Security

Malicious actors use common approaches, and, depending on what account is compromised, they will attempt to conduct fraud and exfiltrate data. But if the account or data obtained doesn't enable fraud to be committed, they will often use the compromised account to target the supply chain and partners of the compromised organization instead.

Attend this session for insights on:

  • How does such an attack occur?
  • What can you do to mitigate or reduce the likelihood such an attack will succeed?
  • What actions should you take if a breach occurs.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.