What You'll Learn
Who Should Attend
IT, Senior Management, Board Members, Risk Management, Security/Technology, and Compliance personnel will find this webinar valuable.
Join us as we walk through a real-world case study of a Business Email Compromise attack! We’ll discuss how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your institution.
IT, Senior Management, Board Members, Risk Management, Security/Technology, and Compliance personnel will find this webinar valuable.