Anatomy of a BEC Attack & How to Stop at the Source

Logo
Presented by

Shashi Prakash, Co-Founder & Chief Technology Officer at Bolster and Monnia Deng, Head of Product Marketing at Bolster

About this talk

Business Email Compromise (BEC) attacks continue to be a significant and evolving threat to organizations of all sizes. These attacks often involve impersonating high-level executives, vendors, or trusted contacts within an organization to manipulate recipients into complying with fraudulent requests, including transferring funds, sharing sensitive information, or taking actions that benefit the attackers. According to Gartner “73% of organizations reported at least one BEC attempt in 2023, with financial losses estimated by the FBI at $2.9 billion”. BEC scams and executive impersonation attacks are becoming more realistic and human-centered, making them increasingly difficult for employees to identify. Businesses need to have multi-channel protection measures in place to proactively identify early indicators of BEC attacks, and stop them before they hit inboxes. This webinar aims to explore the anatomy of a BEC attack by diving into the early indicators that can help organizations identify and mitigate these threats effectively. Join Bolster leaders as they discuss: - The 5 most common types of attacks, including fake invoices, account compromise, and more - The attack sequence of a BEC attack and why they are so effective - Where in the attack sequence you can add security measures to mitigate risk - How to stop these attacks at the source Register today to gain valuable insights into the best mitigation strategies for combatting BEC attacks. With the right AI-powered detection, your business can prevent financial and reputational impacts of BEC attacks targeting your consumers, employees, and prospects.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (16)
Subscribers (1961)
Thought provoking webinars featuring cybersecurity subject matter experts discussing recent trends on generative AI, information security, phishing attacks, threat intelligence, large language models, trademark infringement, online scam and fraud, SecOps excellence, dark web insights, brand protection, and more! The channels is educational for for CIOs, CISOs, S/VPs, Directors, Managers, Architects, Engineers, SecOps and Analysts in Security and IT.