Webinar: Business Process Compromise attacks – A new era of threat

Sponsored by: Trend Micro

Focused on:

    Date: 24 May

    Days to go: 25

    Time: 11AM London

    Over the past couple years, Business Email Compromise (BEC) attacks have wreaked havoc on businesses from all industries and of all sizes around the world. One of the most notable examples being the Bangladesh Bank heist. As cybercriminals evolve however, they are starting to advance these tactics to create a new, more nefarious type of attack. This webinar will describe this new attack method, Business Process Compromise (BPC), and explain how cybercriminals’ understanding of how organisations process financial transactions is being used to increase their payout. While a BEC attack might yield a hundred thousand pounds by luring an innocent employee to transfer money to a criminal’s account, hacking directly into a financial transaction system could result in far greater financial windfalls for criminals.

    Join this webinar to hear several real-world examples highlighting how BPC works and specific steps that your organisation can take to recognise and defend against Business Process Compromise. The speakers will demonstrate how security technologies like application control can lock down access to mission-critical terminals while endpoint protection detects malicious lateral movement.

    Presented by

    Morton Swimmer,

    Senior Threat Researcher, Trend Micro Forward Looking Threat Research (FTR)

    Dr Morton Swimmer is a founding member of the digital community CARO.org and a researcher in the field of Malware and security since 1988. He is also the Technical Editor at Virus Bulletin. Over the years, he has worked in academia as well as industry working for IBM Research, S&S International (now Intel), Intel Security and currently Trend Micro. In his role at Trend Micro as Senior Threat Researcher is he responsible for research on dark markets, hacker groups, as well as in-depth analysis of malware and supporting law enforcement.

    Key Learning Objectives

    • Understand how Business Process Compromise attacks work
    • Hear lessons learned through case study examples of BPC
    • Find out which industries are most vulnerable to this type of intrusion
    • Hear practical steps that will help protect your organization from this type of attack

    Audience

    • CSO/ CISO/ Security Officer/ ISO
    • CIO/ CTO
    • CEO/ President/ Owner/ Partner
    • CFO/ Treasurer/ Controller
    • COO/ General Manager
    • Ex Director/ Managing Director
    • Chief Risk/ Privacy/ Compliance Officer
    • EVP/ Senior VP/ VP of Security
    • EVP/ Senior VP/ VP of Finance/Accounting
    • EVP/ Senior VP/ VP of Operations
    • EVP/ Senior VP/ VP of IS/ IT/ Communications
    • EVP/ Senior VP/ VP of Networking
    • EVP/ Senior VP/ VP of Risk/ Privacy/ Compliance
    • Director/ Manager of Security
    • Director/ Manager of Finance/ Accounting
    • Director/ Manager of Operations
    • Director/ Manager of IS/ IT/ Communications / Networking
    • Director/ Manager of Risk/ Privacy/ Compliance
    • IT Staff: Engineer
    • IT Staff: Architect