2018 London Security Summit , Business Email Compromise (BEC) , Email Security & Protection
Anatomy of a BEC Attack
This session looks at two real-life case studies, with different outcomes from the same initial starting point for two companies. The first led to £140k loss due to malicious invoicing; the second led to data exfiltration and reputational damage (as well as ICO reporting due to GDPR).
See Also: Protecting Australia’s Vital Energy Grid with Stronger Security Culture
Malicious actors use common approaches, and, depending on what account is compromised, they will attempt to conduct fraud and exfiltrate data. But if the account or data obtained doesn't enable fraud to be committed, they will often use the compromised account to target the supply chain and partners of the compromised organization instead.
Attend this session for insights on:
- How does such an attack occur?
- What can you do to mitigate or reduce the likelihood such an attack will succeed?
- What actions should you take if a breach occurs.