Training

2019 Bengaluru Fraud & Breach Summit , Business Email Compromise (BEC) , Events

Securing Business Emails From Attack: Discovering the Weakest Link

Email remains a key vector for attacks, with business email compromises, which often involve impersonating a senior executive to request a money transfer, a growing concern.

BEC attacks often are not detected because the transaction appears legitimate. CISOs have searching for better ways to mitigate the risk.

This session reviews:

  • The weakest link in business email security;
  • How to better articulate the threat of email spoofing to executives;
  • Techniques to plug gaps in email security.

Webinar Registration

In Development

Receive Invite When Available



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.