Using a real Business Email Compromise example from ABAX, this live interview will discuss what happened, how it was discovered, the investigation that followed, and the result of the incident. From there, we will discuss potential causes and potential reasons for a BEC, drawing from this and other recent examples. The discussion will be framed within a human factors frame.
Protecting Data & the Supply Chain Ecosystem Human Element
supply chain social engineering security awareness phishing email security
Share With Your Community