Posted on
in Presentations
Using a real Business Email Compromise example from ABAX, this live interview will discuss what happened, how it was discovered, the investigation that followed, and the result of the incident. From there, we will discuss potential causes and potential reasons for a BEC, drawing from this and other recent examples. The discussion will be framed within a human factors frame.
Protecting Data & the Supply Chain Ecosystem Human Element
supply chain social engineering security awareness phishing email security
Topic
Protecting Data & the Supply Chain Ecosystem
Human Element
Subtopic
supply chain
social engineering
security awareness
phishing
email security
Share With Your Community