Editor’s Note: Business Email Compromise (BEC) continues to pose severe risks to organizations, often resulting in significant financial repercussions and reputational harm. HaystackID’s webcast, “Anatomy of a Business Email Compromise,” offers crucial insights from seasoned cybersecurity professionals into how these attacks unfold and how they can be countered. This detailed session will equip participants with an understanding of the tactics cybercriminals deploy, the downstream impacts of BEC, and effective strategies to mitigate such threats. For cybersecurity, eDiscovery, and information governance professionals, this is an opportunity to deepen your awareness and strengthen your defense frameworks against one of today’s most pervasive cyber threats.
Content Assessment: [Educational Webcast] Anatomy of a Business Email Compromise
Information - 93%
Insight - 94%
Relevance - 94%
Objectivity - 90%
Authority - 94%
93%
Excellent
A short percentage-based assessment of the qualitative benefit expressed as a percentage of positive reception of the recent article from ComplexDiscovery OÜ titled, "Anatomy of a Business Email Compromise."
A Legal Education Presentation prepared by HaystackID®
Business Email Compromise (BEC) has become a significant threat to organizations of all sizes, often resulting in hefty financial losses, operational disruptions, and reputational damage. Learn from HaystackID’s seasoned cybersecurity experts how to detect and prevent BEC attacks during our upcoming webcast, “Anatomy of a Business Email Compromise.”
During the in-depth presentation, our team will guide you through the anatomy of a BEC attack, from pre-attack reconnaissance and target identification to attack execution and post-attack exploitation involving fund transfers, data exfiltration, and data shaming.
Attendees will have the opportunity to explore:
- How BEC can serve as a gateway to larger cyberattacks.
- Tactics used by threat actors and the severe impact these attacks can have on business reputation and legal standing.
- Strategies that your organization can deploy to detect and prevent BEC attacks.
Expert Panelists
+ Shawn Belovich
Senior Vice President of Digital Forensics and Cyber Incident Response, HaystackID
Shawn Belovich is a recognized digital forensic, eDiscovery, and cybersecurity expert, having served as Deputy Chief Information Security Officer for the White House during his tenure at the Executive Office of the President (EOP) from November 2013 to July 2018. In this role, he was responsible for the global protection of White House information, information assurance, information governance, electronic records management, forensic and eDiscovery operations, cybersecurity, insider threat, data loss prevention, and internal investigations. More recently, Belovich was a Managing Director and Partner for global consulting firms.
+ John Brewer
Chief Artificial Intelligence Officer and Chief Data Scientist, HaystackID
John Brewer has worked with HaystackID since 2015 and now serves as the Chief Artificial Intelligence Officer and the Chief Data Scientist. In his role as CAIO, Brewer guides the company’s integration of artificial intelligence and generative AI within the legal technology sector, capitalizing on his remarkable two decades of AI experience. He has been pivotal in the adoption of large-scale technology-assisted review, developing the suite of AI-based machine learning tools that power HaystackID’s review process, driving loss prevention, and ensuring unparalleled efficiency – most notably, Protect Analytics, the company’s exclusive set of technologies and processes that allow client data set analysis for sensitive information including personally identifiable information and protected health information, as well as data breach code anomalies. Brewer’s approach avoids opportunistic trends, centering instead on thoroughly researched AI solutions that are in line with the client’s real needs and ethical standards. Brewer’s deep understanding of decades of AI capabilities distinguishes him as an exceptional leader and innovator.
+ Kevin Golas
Managing Director, HaystackID
Kevin Golas is a Managing Director in HaystackID’s Advisory Group. An accomplished cybersecurity executive with over 20 years of experience in cyber security, risk management, and data compliance, Golas has worked at larger enterprise companies like T-Mobile, Grant Thornton, and OpenText. He has a proven track record of success in developing and implementing effective cybersecurity programs, mitigating cyber risks, and protecting sensitive data. Golas is a passionate and dedicated cybersecurity leader who is committed to making the world a safer place. He is a highly sought-after speaker and thought leader in the cybersecurity community.
+ Nate Latessa
Executive Vice President of Advisory Services, HaystackID
Nate Latessa is the Executive Vice President of Advisory Services at HaystackID. With over two decades of experience, he is a prominent figure in information governance and eDiscovery. His expertise in using advanced eDiscovery tools has streamlined litigation processes, while his understanding of data and legal compliance has distinguished him in the field.
+ Michael D. Sarlo
Chief Innovation Officer and President of Global Investigations and Cyber Incident Response, HaystackID
Michael Sarlo works closely with HaystackID’s software development and data science teams to deliver best-in-class data collection, eDiscovery, and review solutions that allow legal teams to act on data types typically not conducive to collection, review, or production in the context of eDiscovery. Sarlo works closely with clients on the most challenging and complex regulatory, investigative, and civil litigation matters. Sarlo also oversees HaystackID’s Cyber Discovery and Incident Response Services division. He leads a cross-functional team of HaystackID experts that regularly assist insurers, breach coaches, and their corporate clients when a data breach occurs.
About HaystackID®
HaystackID solves complex data challenges related to legal, compliance, regulatory, and cyber events. Core offerings include Global Advisory, Data Discovery Intelligence, HaystackID Core® Platform, and AI-enhanced Global Managed Review powered by its proprietary platform, ReviewRight®. Repeatedly recognized as one of the world’s most trusted legal industry providers by prestigious publishers such as Chambers, Gartner, IDC, and Legaltech News, HaystackID implements innovative cyber discovery, enterprise solutions, and legal and compliance offerings to leading companies and legal practices around the world. HaystackID offers highly curated and customized offerings while prioritizing security, privacy, and integrity. For more information about how HaystackID can help solve unique legal enterprise needs, please visit HaystackID.com.
Source: HaystackID
Assisted by GAI and LLM Technologies