3 Ways to Detect Business Email Compromise in Office 365

Logo
Presented by

Anthony Randazzo, Manager, Detection & Response Engineering, Expel

About this talk

Phishing attacks are on the rise and BEC is still the number one tactic. In order to keep your org and its users safe, it’s important to understand the BEC attack life cycle and know where to look to spot evil – especially as these attacks continue to evolve. In this session you’ll find out what the BEC attack life cycle looks like, what signal is available in Microsoft Azure and O365 to detect a potential BEC attack and get three tips on how you can detect an attacker in your Exchange Online environment.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (13)
Subscribers (1153)
Expel is a managed detection and response (MDR) provider whose mission is to make great security as accessible as the internet. Our 24x7 SOC offers security monitoring and response for cloud, hybrid and on-premises environments. Our BrightTalk channel focuses on tips and tricks for detecting the latest threats using all your go-to security tech. Learn more about us at https://expel.io.