Skip Navigation
Get a Demo
 
November 14, 2024 Resources Upcoming Webinars

Identity theft is not a joke, Jim! How to detect business email compromise

Business Email Compromise (BEC) and Email Account Compromise (EAC) is a growing threat, costing over $2.1 billion in global losses annually. Join us as we deep dive into various BEC scenarios and trends.

Register Now

Thu., November 14, 2024

2pm ET (30 mins.)

Virtual

Business Email Compromise (BEC) and Email Account Compromise (EAC) is a growing threat, costing over $2.1 billion in global losses annually. Join us as we deep dive into various BEC scenarios and trends.

 

Adversaries compromise or spoof a legitimate email to initialize wire fraud, steal sensitive information, or install malware within an organization.

In this webinar, you will learn about legacy authentication protocols and Adversary-in-the-middle attacks, which are common methods used to get around Multi-factor Authentication (MFA). Additionally, attendees will be equipped with how to detect and hunt for BEC through email rule analytics, MFA method modifications, and user agent analytics.

 
Mak Foss
Detection Engineer
As a detection engineer, Mak develops detection analytics and analyzes potentially malicious activity in customers' environments. Prior to joining Red Canary, Mak worked as a security engineer at a major food distributor. In college, Mak balanced cheerleading with hacking club while completing a multiyear internship with one of the country’s top healthcare systems.
As a detection engineer, Mak develops detection analytics and analyzes potentially malicious activity in customers' environments. Prior to joining Red Canary, Mak worked as a security engineer at a major food distributor. In college, Mak balanced cheerleading with hacking club while completing a multiyear internship with one of the country’s top healthcare systems.
 
Rachel Schwalk
Sr. Detection Engineer
Rachel’s background is primarily in blue team operations. Rachel spent several years working as a cybersecurity analyst on an incident response team. In this role, she became fascinated with digital forensics and threat detection. She is now on the Detection Engineering team at Red Canary, where she spends her time hunting for evil across customer environments and developing new methods of detection.
Rachel’s background is primarily in blue team operations. Rachel spent several years working as a cybersecurity analyst on an incident response team. In this role, she became fascinated with digital forensics and threat detection. She is now on the Detection Engineering team at Red Canary, where she spends her time hunting for evil across customer environments and developing new methods of detection.
 
 
Back to Top