1 Hour 30m
Webinar
What You'll Learn
Who Should Attend
IT, Senior Management, Board Members, Risk Management, Security/Technology, and Compliance personnel will find this webinar valuable.
Join us as we walk through a real-world case study of a Business Email Compromise attack! We’ll discuss how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your institution.
1 Hour 30m
Webinar
IT, Senior Management, Board Members, Risk Management, Security/Technology, and Compliance personnel will find this webinar valuable.