A business email compromise (BEC) attack, though lacking in sophistication, has yielded better results for bad actors since human trust has been easier to exploit than software vulnerabilities. BEC attacks begin with hacking and spoofing emails impersonating your company’s supervisors, CEO or vendors and with the email seemingly legitimate, employees comply. This has led to the global economy losing billions of dollars year on year to BEC attacks.
Addressing this issue, Kroll experts Andrew Beckett, Managing Director and EMEA Cyber Risk Leader and James Thoburn, Vice President and Incident Response Team Leader, put together an interactive walkthrough utilizing internal data to help participants understand what a BEC attack is and how it works. Andrew and James, having responded to over hundreds of BEC attacks, will focus on the most common means utilized by bad actors to gain access to an organization’s communications, and the best practices and techniques for individuals to mitigate the risk and spot attacks as and when they happen.
Schedule: 1:00 p.m. – 1:45 p.m. (CET)
- Understanding and examining the mechanics of a BEC attack
- Impact of BEC attacks in EMEA
- Common BEC attack scenarios and techniques
- Kroll cases studies
- Steps to mitigate and reduce the risk of an attack
- Andrew Beckett, Managing Director and EMEA Leader, Cyber Risk, Kroll, a division of Duff & Phelps
- James Thoburn, Vice President and Incident Response Team Leader, Cyber Risk, Kroll, a division of Duff & Phelps