Webcast: Business Email Compromise – What you Should Know and How to Minimize Disruption

June 24, 2020
Webcast , Countries

A business email compromise (BEC) attack, though lacking in sophistication, has yielded better results for bad actors since human trust has been easier to exploit than software vulnerabilities. BEC attacks begin with hacking and spoofing emails impersonating your company’s supervisors, CEO or vendors and with the email seemingly legitimate, employees comply. This has led to the global economy losing billions of dollars year on year to BEC attacks. 

Addressing this issue, Kroll experts Andrew Beckett, Managing Director and EMEA Cyber Risk Leader and James Thoburn, Vice President and Incident Response Team Leader, put together an interactive walkthrough utilizing internal data to help participants understand what a BEC attack is and how it works. Andrew and James, having responded to over hundreds of BEC attacks, will focus on the most common means utilized by bad actors to gain access to an organization’s communications, and the best practices and techniques for individuals to mitigate the risk and spot attacks as and when they happen.

Register now.

Schedule: 1:00 p.m. – 1:45 p.m. (CET)

Key Takeaways

  • Understanding and examining the mechanics of a BEC attack
  • Impact of BEC attacks in EMEA
  • Common BEC attack scenarios and techniques
  • Kroll cases studies
  • Steps to mitigate and reduce the risk of an attack


  • Andrew Beckett, Managing Director and EMEA Leader, Cyber Risk, Kroll, a division of Duff & Phelps
  • James Thoburn, Vice President and Incident Response Team Leader, Cyber Risk, Kroll, a division of Duff & Phelps

Register now.

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

Data Protection Officer (DPO) Consultancy Services

Kroll's data privacy team provide DPO consultancy services to help you become and stay compliant with regulatory mandates.

Data Breach Call Center Services

A notification letter can generate lots of questions for those affected by a data breach. Kroll’s call center services are provided by skilled representatives who know how to handle difficult questions and stand at the ready to serve your breached population.


Proactively monitor, detect and respond to threats virtually anywhere – on endpoints and throughout the surface, deep and dark web.

Cyber Vulnerability Assessment

Proactively identify vulnerable systems and devices that may be exploited by an attacker or malicious software, often resulting in data loss or breach.