Take the ACID test: How AI-driven behavioural models are the answer to identity-based attacks

Take the ACID test: How AI-driven behavioural models are the answer to identity-based attacks

Add to Calendar
Artificial Intelligence Vulnerabilities and Flaws Data Breach Cyber Espionage Cyber Crime

There is no denying that business email compromise (BEC) is big business for cybercriminals. Chances are, you’ve probably been a recipient of 'a well researched' social-engineered emails yourself. But the question remains… who is behind these increasingly sophisticated email attacks, and why did they become so popular in recent years? Why is it that humans worldwide fall for it and businesses still bleed easy money to these cybercriminals? Will we ever be able to trust our email?

Join this insightful conversation between SC Media's Tony Morbin and Agari's Crane Hassold on why security teams need to adopt an approach that is based on threat actor identity rather than type of fraudulent activity, in order to detect email fraud and protect their businesses.

Loading feed

Speakers

Tony  Morbin Tony Morbin Editor-in-Chief SC Media UK
Crane Hassold Crane Hassold Senior Director of Threat Research Agari Bio
share