Anatomy of a Business Email Compromise

Logo
Presented by

Shawn Belovich, John Brewer, Kevin Golas, Nate Latessa, and Michael Sarlo

About this talk

Business Email Compromise (BEC) has become a significant threat to organizations of all sizes, often resulting in hefty financial losses, operational disruptions, and reputational damage. Learn from HaystackID’s seasoned cybersecurity experts how to detect and prevent BEC attacks during our upcoming webcast, “Anatomy of a Business Email Compromise.” During the in-depth presentation, our team will guide you through the anatomy of a BEC attack, from pre-attack reconnaissance and target identification to attack execution and post-attack exploitation involving fund transfers, data exfiltration, and data shaming. Attendees will have the opportunity to explore:  + How BEC can serve as a gateway to larger cyberattacks. + Tactics used by threat actors and the severe impact these attacks can have on business reputation and legal standing. + Strategies that your organization can deploy to detect and prevent BEC attacks. Source: HaystackID
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (69)
Subscribers (4568)
Educational and entertaining webcasts and updates on computer forensics, early case insight, and legal review from the specialized eDiscovery services firm that is big enough to matter and small enough to care. Regular content includes briefings and presentations designed to help legal professionals find, learn, and listen to their data when they face complex, data-intensive investigations and litigation. Learn more at HaystackID.com.