Webcast: Business Email Compromise – What you Should Know and How to Minimize Disruption June 24, 2020 Webcast

or to bookmark this page

Click here to bookmark this page

Click here to remove bookmark

A business email compromise (BEC) attack, though lacking in sophistication, has yielded better results for bad actors since human trust has been easier to exploit than software vulnerabilities. BEC attacks begin with hacking and spoofing emails impersonating your company’s supervisors, CEO or vendors and with the email seemingly legitimate, employees comply. This has led to the global economy losing billions of dollars year on year to BEC attacks. 

Addressing this issue, Kroll experts Andrew Beckett, Managing Director and EMEA Cyber Risk Leader and James Thoburn, Vice President and Incident Response Team Leader, put together an interactive walkthrough utilizing internal data to help participants understand what a BEC attack is and how it works. Andrew and James, having responded to over hundreds of BEC attacks, will focus on the most common means utilized by bad actors to gain access to an organization’s communications, and the best practices and techniques for individuals to mitigate the risk and spot attacks as and when they happen.

Register now.

Schedule: 1:00 p.m. – 1:45 p.m. (CET)

Key Takeaways

  • Understanding and examining the mechanics of a BEC attack
  • Impact of BEC attacks in EMEA
  • Common BEC attack scenarios and techniques
  • Kroll cases studies
  • Steps to mitigate and reduce the risk of an attack

Speakers

  • Andrew Beckett, Managing Director and EMEA Leader, Cyber Risk, Kroll, a division of Duff & Phelps
  • James Thoburn, Vice President and Incident Response Team Leader, Cyber Risk, Kroll, a division of Duff & Phelps

Register now.

2020-06-24T00:00:00.0000000 0001-01-01T00:00:00.0000000 /-/media/kroll/images/events/2020/featured-images/maze-ransomware.jpg /en/insights/events/2020/webcast-business-email-compromise-minimize-disruption event {E39587AD-8F0B-4FE2-865F-969BC5501096} {010E62CD-5FFC-47D2-9A88-ACC26BCD8EAC} {4D975B32-83A6-485A-843E-2131B17303F0} {9B1D3D09-0913-4DF6-9717-5F30A36A4F95} {E538E14D-C192-4A8E-8861-504D0EEBF99A} {1CF418EA-8C84-4BCD-BB0A-320F07DB9AB5} {70E25357-B690-49B8-948F-958DAD26DCD4}

Contact Us

Other Areas We Can Help

Cyber Risk

Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk
System Assessments and Testing

Cyber Vulnerability Assessment

Services using cutting-edge tools to help clients map a prioritized path to increased cyber security.

Cyber Vulnerability Assessment

Insights

Cyber

CVE-2020-10189: Zoho ManageEngine Vulnerability Still Dangerous Nearly a Year Later – The Monitor, Issue 15

Cyber
Cyber

CVE-2020-1472: Microsoft Releases Unusual Two-Phase Patch to Enforce Secure RPC

Cyber
Cyber Risk

Proceed with Caution: Using Controls to Manage Risk in Digital Currency Transactions

Cyber Risk

Events

Life Sciences Week Webcast

Calendar

Location