Many banking institutions boast of being "digital first" and enabling "omnichannel banking." But are they fully aware of the new fraud risks they also are inviting? Kimberly Sutherland and Kimberly White of LexisNexis Risk Solutions discuss how to mitigate omnichannel fraud.
For public sector technology leaders evaluating technologies to combat malware attacks, this report offers important considerations for deploying cloud-based security.
Ransomware and other data security threats are a serious concern for any organization, but the stakes are higher and the risks are greater for...
As of Q1 2018, the global cybersecurity community finds themselves inundated with both internal and external advanced threat actors who are stealthier, more resilient and sadly, more effective than they have ever been before. Many organizations are coming to terms with deciding whether their security posture is...
Email breaches come in many forms, all of which can be devastating. From phishing scams to man-in-the-middle attacks and beyond, organizations must gain a firm grasp on the evolving threat landscape, as well as an understanding of the layers of vulnerability within any given email thread.
In this session, we break...
The success of a Business Email Compromise (BEC) attack lies in exploiting the trust and familiarity between sender and recipient, and evading traditional security solutions by eliminating the use of malicious URLs or attachments - which existing security solutions were never designed to do.
According to the FBI,...
Business email compromise attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. This session reviews why email spoofing works, the...
The FBI reports that 22,000 businesses worldwide have been victims of Business Email Compromise (BEC), with recent losses exceeding $5B. In virtually every one of these cases, attackers fraudulently extracted funds from financial institutions using advanced social engineering and email deception tactics.
In this...
It's a growing epidemic: Ransomware, advanced persistent threats and phishing attacks are responsible for hundreds of millions of dollars in damage due to lost productivity, tainted credibility and worse - lost revenue. As attackers plan increasingly more sophisticated attacks, your organization needs to know how best...
Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. This session will review why email spoofing...
In this session, Trend Micro will review its own research into Pawn Storm (a.k.a., APT28, Fancy Bear, Strontium, etc.), which exposes the scope and scale of the cyber-espionage attacks the cyber tradecraft of those who wage these attacks. Trend Micro's researchers have observed activity dating back to 2004, with...
Despite the proliferation of social networks and messaging apps, email remains the primary means of communication today. Unfortunately, it also remains a persistent threat vector for cybersecurity abuse. We see these evil emails everywhere: at work, at home and in the news, attempting to sell something, or steal...
This session will review the latest trends in ongoing and emerging cyberthreats posed by cybercriminals. FBI Supervisory Special Agent Matt Braverman will walk through the latest tactics being used in ransomware, business email compromise exploits and other cyber-extortion schemes, and discuss the FBI's stance on how...
Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. This session will review why email spoofing...
Cyber-extortion has reached new proportions, with a wide variety of methods, such as distributed-denial-of-service attacks and ransomware variants, being used to extort individuals and organizations. Ransomware-DDoS hybrid attacks, like Cerber, have showcased how attackers have added DDoS capabilities to ransomware....
Business email compromise (BEC) attacks that impersonate executives and business partners to trick employees comprise the biggest cyberthreat organizations face today. This is not news. But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.