InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Anatomy of a BEC Attack & How to Stop at the Source

Presented by

Shashi Prakash, Co-Founder & Chief Technology Officer at Bolster and Monnia Deng, Head of Product Marketing at Bolster

About this talk

Business Email Compromise (BEC) attacks continue to be a significant and evolving threat to organizations of all sizes. These attacks often involve impersonating high-level executives, vendors, or trusted contacts within an organization to manipulate recipients into complying with fraudulent requests, including transferring funds, sharing sensitive information, or taking actions that benefit the attackers. According to Gartner “73% of organizations reported at least one BEC attempt in 2023, with financial losses estimated by the FBI at $2.9 billion”. BEC scams and executive impersonation attacks are becoming more realistic and human-centered, making them increasingly difficult for employees to identify. Businesses need to have multi-channel protection measures in place to proactively identify early indicators of BEC attacks, and stop them before they hit inboxes. This webinar aims to explore the anatomy of a BEC attack by diving into the early indicators that can help organizations identify and mitigate these threats effectively. Join Bolster leaders as they discuss: - The 5 most common types of attacks, including fake invoices, account compromise, and more - The attack sequence of a BEC attack and why they are so effective - Where in the attack sequence you can add security measures to mitigate risk - How to stop these attacks at the source Register today to gain valuable insights into the best mitigation strategies for combatting BEC attacks. With the right AI-powered detection, your business can prevent financial and reputational impacts of BEC attacks targeting your consumers, employees, and prospects.
Bolster AI

Bolster AI

4225 subscribers25 talks
Delivering continuous, real-time protection for brands and customers
Thought provoking webinars featuring cybersecurity subject matter experts discussing recent trends on generative AI, information security, phishing attacks, threat intelligence, large language models, trademark infringement, online scam and fraud, SecOps excellence, dark web insights, brand protection, and more! The channels is educational for for CIOs, CISOs, S/VPs, Directors, Managers, Architects, Engineers, SecOps and Analysts in Security and IT.
Related topics