WEBINAR

Think Like a Hacker: Unmasking Business Email Compromise

WATCH NOW

Learn about the anatomy of a Business Email Compromise attack from beginning to end and how to better protect your organization in our recorded webinar.

Business email compromise (BEC) attacks are sophisticated, well-planned phishing attacks. A cybercriminal will hack into a corporate email account and impersonate the real owner, typically a high-level executive or trusted contact. The goal of this takeover is to defraud people into sending money or sensitive data to the attacker, when they believe they are interacting with their CFO or manager.

BEC attacks have increased 80% since last quarter – is your business protected?

Join Dataprise Director of Information Security Tim Foley as he discusses:

  • What Business Email Compromise is and how these sophisticated man-in-the-middle attacks can affect your organization
  • How Business Email Compromise works and utilizes OSINT reconnaissance, social engineering, and phishing tactics
  • Examples of Business Email Compromise scams
  • Best practices for protecting against Business Email Compromise

 

Need help with Information Security?

Dataprise offers a full suite of secirity services, including assessments, managed security, security program development and consulting, and more.

lock_circle_gray_image

Meet the Presenter

Tim Foley Headshot


Tim Foley, Director of Information Security at Dataprise

Tim Foley joined the Dataprise family in 2011. Tim has held a number of roles during his tenure at Dataprise, and serves as our Director of Information Security. He is a proven thought leader who brings with him over 15 years of industry experience, with a focus on Information Security. Tim leads the Dataprise Information Security practice, where his passion for driving transparency consistently leads to better business decisions and increased value for our customers. Tim and his team are able to fill the C-level Strategic Security needs by leveraging the Dataprise Cyber Security Intelligence Lifecycle (CSIL) and Six Sigma Process Improvement practices.