Loading...

Anatomy of a Cyber Attack: Business Email Compromise

According to recent studies, the average user has approximately 100 passwords to remember. As if this isn’t challenging enough, password requirements differ among the myriad of applications we use. With so many passwords to remember, coupled with the never-ending list of password requirements, users are partaking in a risky solution – reusing passwords.

OnDemand
Recorded Tuesday,
September 13th, 2022
Presented by Jon Waldman
2h total length
$279.00 or 1 Token

Includes: 30 Days OnDemand Playback, Presenter Materials and Handouts

  • Information Technology/Security
  • Risk Management/Legal
  • Technology/Security
  • Board Member
  • Compliance Officer
  • Internal Auditor
  • IT Professional
  • Privacy Officer/Information Security Professional
  • Risk Manager
  • Security Officer
  • Senior Management

Save on training and share webinar access across your entire organization.

Request more information

Learn about upcoming events, webinars and discounts.

Sign Up For Email Notifications

According to recent studies, the average user has approximately 100 passwords to remember. As if this isn’t challenging enough, password requirements differ among the myriad of applications we use. With so many passwords to remember, coupled with the never-ending list of password requirements, users are partaking in a risky solution – reusing passwords.

Unfortunately, we've seen many organizations have their business email accounts compromised through credential reuse. Business Email Compromise (BEC) can lead to not only propagating further BEC attacks, but also a full-blown data breach and network compromise.

What You'll Learn

  • The Scenario - What Happened?
  • Typical BEC Attack Scenario Walk-Through
  • How BEC Can Turn Into Full Network Compromise
  • What's in Your Email?
  • Top Controls to Mitigate BEC Risk

Who Should Attend

Information Security Officer, IT Manager, Risk Officer, Internal Auditor, and Executives looking to understand the risk around Social Engineering and how to mitigate people risk.


Jon Waldman

Instructor Bio

Jon Waldman is a co-founder and Senior Information Security Consultant for SBS CyberSecurity, a premier cybersecurity consulting and audit firm dedicated to making a positive impact on the banking and financial services industry. He maintains his CISA and CRISC certifications and received his Bachelor of Science in Computer Information Systems and his Master of Science in Information Assurance with an emphasis in Banking and Finance Security from Dakota State University. Over the last ten years, Jon has helped hundreds of financial institutions across the country create and implement comprehensive, valuable, and manageable Information Security Programs. He also conducts webinars and certification programs for the SBS Institute.