A business email compromise (BEC) attack, though lacking in sophistication, has yielded better results for bad actors since human trust has been easier to exploit than software vulnerabilities. BEC attacks begin with hacking and spoofing emails impersonating your company’s supervisors, CEO or vendors and with the email seemingly legitimate, employees comply. This has led to the global economy losing billions of dollars year on year to BEC attacks. 

Addressing this issue, Kroll experts Andrew Beckett, Managing Director and EMEA Cyber Risk Leader and James Thoburn, Vice President and Incident Response Team Leader, put together an interactive walkthrough utilizing internal data to help participants understand what a BEC attack is and how it works. Andrew and James, having responded to over hundreds of BEC attacks, will focus on the most common means utilized by bad actors to gain access to an organization’s communications, and the best practices and techniques for individuals to mitigate the risk and spot attacks as and when they happen.

Register now.

Schedule: 1:00 p.m. – 1:45 p.m. (CET)

Key Takeaways

  • Understanding and examining the mechanics of a BEC attack
  • Impact of BEC attacks in EMEA
  • Common BEC attack scenarios and techniques
  • Kroll cases studies
  • Steps to mitigate and reduce the risk of an attack

Speakers

  • Andrew Beckett, Managing Director and EMEA Leader, Cyber Risk, Kroll, a division of Duff & Phelps
  • James Thoburn, Vice President and Incident Response Team Leader, Cyber Risk, Kroll, a division of Duff & Phelps

Register now.

2020-06-24T00:00:00.0000000 0001-01-01T00:00:00.0000000 /-/media/kroll/images/events/2020/featured-images/maze-ransomware.jpg /en/insights/events/2020/webcast-business-email-compromise-minimize-disruption event {78D3F940-BF08-40FB-A7F6-B55FB2D9165B} {DDB3722E-3678-43FB-8989-224F6C919C9A} {CF536F14-5642-4A78-B222-89E096E41A19} {41C2B883-4E8E-4CB3-8774-5F5B9AEC0582} {1AB4A94D-BDC5-4744-81D9-A9DF250E9807} {FF744058-87F5-470D-A638-A3EE0F8528F6} {70E25357-B690-49B8-948F-958DAD26DCD4}

Contact Us

Insights

Cyber Risk

Proceed with Caution: Using Controls to Manage Risk in Digital Currency Transactions

Cyber Risk
Cyber Risk

Has COVID–19 Impacted Your Ability to Preserve Evidence for Future Litigation?

Cyber Risk
Cyber Risk

COVID-19 + Shadow IT = Trouble Ahead

Cyber Risk