Anatomy of an Attack – Business Email Compromise (BEC)
Join us as we walk through a real-world case study of a Business Email Compromise attack! We’ll discuss how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your institution.