Office 365, or O365, has made online applications easier for businesses of all sizes. It's also created a significant attack vector that attackers have been exploiting for years to the tune of BILLIONS a year. Business Email Compromise, or BEC, is the name given to these types of email-based attacks that have cost businesses over $12 billion, and show little sign of slowing down. It's time we turn the tables.
In this webcast, we will examine how and why O365 has become such a successful attack vector. Specifically, we are going to examine examples of spoofed and fraudulent emails and how the attackers work to understand the flow of money within your organization. We will also going to look at attacker infrastructure and examine sample code that they use to pilfer credentials from your organization.
We are not stopping there ' we will also talk about how you can defend yourself against these attacks. We've got a brand new tool to release for O365 log analysis - OLAF. We will also talk about what you can do inside O365 RIGHT NOW to protect yourselves against these types of attacks.
Join us for a packed session of attacker tactics, log analysis, defensive mechanisms, and more!