Business Email Compromise (BEC) is one of the most financially damaging online cybercrimes! It leverages spoofing & impersonation techniques for phishing. Learn about our multi-pronged approach to maximize the efficiency & effectiveness of security teams that keep customers safe against such attacks. We'll demonstrate a multi-stage BEC kill chain, walk through how to detect, investigate, hunt & respond to this attack using Microsoft Defender for Office 365 and Microsoft 365 Defender capabilities.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.