Included Webinars
- Inside Business Email Compromise (BEC) Part 1: The Evolving Threat of Business Email Compromise
- Inside Business Email Compromise (BEC) Part 2: Dissecting BEC Attacks – Techniques and Targets
- Inside Business Email Compromise (BEC) Part 3: Fortifying Your Organization against BEC
Who Should Attend
This webinar series is essential for anyone responsible for safeguarding their institution against cyber threats, including IT security professionals, cybersecurity analysts, risk management officers, and compliance managers.
