According to the 2022 FBI Crime Report, Business Email Compromise (BEC) is one of the most financially damaging cybercrimes. To effectively understand and defend against these types of attacks, it is important to adopt a multi-layered approach. BEC attacks rely on identity deception and since they do not contain malicious payloads, they can be hard to detect.

In this webcast, we will discuss real-world BEC examples and tools that are available to assist with Detection, Awareness, Visibility, and Response. We'll deep dive into some best practices for uncovering BEC threats and actions you can take to better protect your organization.

Join us for a 90-minute webinar and fireside chat, where we will provide education, insight, and real-world examples that you can use to better protect your organization from BEC attacks.

In this session, you will learn:

• Current threat landscape and common tactics used by attackers

• Real-world BEC examples and the challenge with identifying them

• Security controls that help stop BEC attacks

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
speaker photo
Abigail J. Tyrrell
Special Agent, U.S. Secret Service, Criminal Investigation Division - GIOC
speaker photo
Keith Roberts
Manager, Cyber Incident Response Team, Abbott

Keith has spent the past 7+ years working in Cyber Incident Response within the Healthcare/Life Sciences space in various roles and has direct experience investigating Business Email Compromise cases. He carries several industry certifications and currently manages Abbott Laboratories’ Cyber Incident Response Team.

speaker photo
Craig Temple
Senior Product Marketing Manager, Proofpoint
speaker photo
Dave Cook
Senior Product Marketing Manager, Proofpoint
speaker photo
Tom Bechtold
Digital Event Director, SecureWorld

Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.