I’ve got no doubt you’ve all heard about Business Email Compromise (BEC) attacks. They’re one of the most costly, invasive, and sinister forms of cyberattack. The FBI estimates BEC has cost its victims $26B over the last 3 years. Some of you may think it’s little more than setting up a Gmail account with a CEO’s name and sending off an email to the CFO asking them to wire money. Sure, that happens, but there is so much more to BEC than just spoofing executive names.
In this real training for free session, I’m going to take a look at BEC attacks and cover in detail the various tactics, techniques and procedures used in practical execution throughout the timeline of an attack, including:
I’ll walk through each and provide real-world examples of what to look for and how to protect against each step of a BEC attack.
Matt Petrosky, CISSP and VP of Product Management at our sponsor, GreatHorn, will also offer up some customer stories of attacks that have happened. He’ll also demonstrate how easy it is for the bad guys to capture credentials as well as offer insights into advanced ways to quickly detect BEC including: