Ransomware and BEC in the Cyber Threat Landscape: Past vs. Present, Perception vs. Reality

Colonial Pipeline. CNA Financial. Quanta. Even the NBA. Hardly a week goes by without a ransomware story hitting the news, as organizations worldwide are targeted by an attack. But are there more dangerous threats out there?

Colonial Pipeline. CNA Financial. Quanta. Even the NBA. Hardly a week goes by without a ransomware story hitting the news, as organizations worldwide are targeted by an attack. But are there more dangerous threats out there?

In this webinar, hear Crane Hassold, Director of Threat Intelligence at Abnormal Security, discuss the real threats in today’s landscape, and why ransomware is only one of your concerns. With full insight into the past, present, and future of the threat landscape, this webinar will provide you everything you need to understand what could be targeting your organization.

Watch this on-demand webinar to learn:

  • How has the cyber threat landscape changed over the past decade?
  • What drives threat actors to change their methods and tactics?
  • Why should stopping business email compromise be at the top of your priority list?
  • And what will change as new regulations are put in place?

Complete the form to watch the recording.

After viewing this webinar, you are eligible for 1 CPE credit through (ISC)².

Ransomware and BEC in the Cyber Threat Landscape: Past vs. Present, Perception vs. Reality

Watch Now

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Resources

B 05 08 23 MKT006 Rise of Israel Based BEC Attacks R2
A recent study uncovered the emergence of an Israel-based threat group that launches sophisticated, multistage BEC attacks targeting global enterprises.
Download Now
B 1500x1500 Forsyth Country Case Study L1 R1
Security team implements Abnormal to prevent advanced attacks targeting local governments nationwide.
Read More
B 07 20 22 Devastating
Business email compromise (BEC) is no joke, and it continues to increase—despite increased awareness of the issue. Learn about the future of BEC attacks in this on-demand webinar.
Watch Now
B Vendors as Your Largest BEC Threat 07 07 22
Threat actors have shifted their strategy—moving away from internal impersonation and instead focusing on impersonating third parties. Watch the webinar to learn more about this new threat: financial supply chain compromise.
Watch Now
Report fscc cover
For years, executives were the go-to impersonated party in business email compromise attacks. Now, threat actors are opting to impersonate vendors and suppliers instead.
Download Now
H1 threat report cover
From June-December 2021, Abnormal Security discovered that nearly all types of advanced email attacks grew in frequency, with a new trend of phone fraud using email as the first contact.
Download Now
Webinar hacking tobac cover
Rachel Tobac talked to Abnormal Security's CISO Mike Britton about hacking, social engineering attacks, and how to protect your organization.
Watch Now
Webinar beyond spam cover
Adversaries are increasingly targeting the enterprise email inbox, and security teams need to look further than just spam and phishing attacks.
Watch Now