Vendors as Your Largest BEC Threat

The Shift to Financial Supply Chain Compromise in 2022

The tactics that worked for your business five years ago likely aren’t still working today, and cybercrime is no different. The CEO fraud that dominated the last few years is not nearly as successful as it used to be, partially because employees understand that their CEO isn’t emailing them about gift cards at 2:00 in the morning.

Not to be outdone, cybercriminals have shifted their tactics, now relying more on vendor impersonation and vendor email compromise to run their scams. The average invoice fraud attack costs $183,000 and Abnormal has seen attacks that request upwards of $2.1 million. Attend this webinar to make sure you’re prepared to defend against them.

Available:
On Demand
Duration:
1h 00min

Join us for this webinar with Crane Hassold, Director of Threat Intelligence at Abnormal Security, where he’ll answer your questions about this new threat, including:

  • What are the various types of financial supply chain compromise?
  • How do threat actors use impersonation and account compromise to run invoice fraud, aging report attacks, and RFQ scams?
  • Why have threat actors shifted tactics, and what do your employees need to know?
  • How can you stop these evolving attacks before they reach your inboxes?

Featured Speakers

  • Crane Hassold
    Crane Hassold
    Director of Threat Intelligence
    Abnormal Security

    Crane Hassold is the Director of Threat Intelligence at Abnormal Security, where he leads an intelligence team responsible for researching enterprise-focused phishing threats. Prior to moving to the private sector in 2015, Crane served as an Analyst at the FBI for more than 11 years, spending most of his career in the Behavioral Analysis Units, providing support to intelligence community and law enforcement partners against national security adversaries and serial criminals. In 2012, Crane helped create the FBI’s Cyber Behavioral Analysis Center, which takes an asymmetric approach to examining cyber threats by combining the traditional behavioral concepts used for decades in the violent crime world with technical expertise to gain a holistic understanding of threat actor TTPs.

  • Michael Krieger
    Michael Krieger
    Moderator
    Dark Reading

    Michael has been involved in various disciplines in the information technology field for more than 25 years. His background and experience in product development, marketing and sales give him a unique perspective on how and why companies succeed in the technology marketplace. He has served as a senior VP for marketing at FutureLink, a large ASP based in Southern California. Before that he was VP of marketing for Hitachi Data Systems’ server product line, and also was a senior product manager for AST Research's server and data communications product lines. His entrepreneurial experience includes founding Solution Business Systems, a developer of manufacturing software for IBM midrange systems. He was also VP of product development at Techland Systems, one of the industry's first creators of micro-to-mainframe emulators.

Sponsored By