YoVDO

The Surge of BEC Attacks and How to Mitigate Damages

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Incident Response Courses

Course Description

Overview

Explore a comprehensive webcast on Business Email Compromise (BEC) attacks and effective mitigation strategies. Gain insights into the surge of BEC scams, which accounted for half of worldwide cybercrime losses in 2019. Understand the tactics, techniques, and procedures used in BEC attacks through real-world case studies. Learn essential response procedures and recommendations to protect your organization from these prevalent threats. Delve into topics such as mail forwarding, Azure Active Directory, and specific case studies with accompanying evidence and screenshots. Walk away with practical knowledge to enhance your cybersecurity posture and mitigate potential damages from BEC attacks in an increasingly cloud-based work environment.

Syllabus

Introduction
Who am I
Overview
What is BEC
Collect Intelligence
Typical Steps
Recommendations
Case Study 1
Screenshots
Mail Forwarding
Azure Active Directory
Additional Findings
Our Recommendations
Additional Recommendations
Case Study 2
Case Study 2 Evidence
Case Study 2 Screenshot
Case Study 4 Screenshot
Case Study 5 Recommendations


Taught by

RSA Conference

Related Courses

Master Mathematical Cryptography 2020: Crack Any Code
Udemy
Cryptography from Scratch| Master Cryptography in Java
Udemy
Information Security in Python
Udemy
Cryptography
Caleb Curry via YouTube
Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube