This webinar will discuss the types of evidence that should be collected in response to a business email compromise/Office 365 email investigation. It will also discuss methods of email compromise (phishing, malware, brute force attacks, and external compromise/credential stuffing), types of data at risk, and commonly seen schemes.
Attention
Due to a federal government shutdown, content updates are temporarily on hold. Content updates and responses to inquiries will resume when normal operations continue.
Cost Information
Amount
0.00
Event Date
-
Provider