Skip Nav

Anatomy of an Attack – Business Email Compromise (BEC) Webinar

Register

Have you ever reused a password? According to recent studies, the average user has about 100 passwords to remember. With so many passwords and a never-ending list of password requirements, it’s no wonder so many people are reusing passwords.

Unfortunately, credential reuse can leave institutions open to Business Email Compromised (BEC). BEC can lead to not only further BEC attacks, but also a full-blown data breach and network compromise. In this webinar, you’ll learn how to recognize BEC attack scenarios and gain best practices for controlling BEC risk.

What You’ll Learn

  • The Scenario – What Happened?
  • Typical BEC Attack Scenario Walk-Through
  • How BEC Can Turn Into Full Network Compromise
  • What’s in Your Email?
  • Top Controls to Mitigate BEC Risk

Who Should Attend
IT, Senior Management, Board Members, Risk Management, Security/Technology, and Compliance personnel will find this webinar valuable.