Would Attackers Target Your Organisation to Manipulate Your Business Processes?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Business process compromise (BPC) is a stealthy attack on target networks giving the attacker the ability to manipulate processes without being discovered. Attacker behaviour is focused, there is deep recognisance, stealthy intrusion techniques and colonisation across many key processes.

However, where many targeted attacks go straight for the data asset (IP or financial data), BPC attacks manipulate legitimate processes and refocus them for the attackers gain.

Such examples have been seen in the manipulation of financial processes (as seen in the Bangladesh Bank heist) as well as drug cartels targeting logistics systems to allow free flow of containers.

As businesses become ever more connected through IOT and complex supply chains, could BPC emerge as one of the biggest cyber-risks facing businesses?

This webinar will look at the risks presented by BPC and the measures companies can take to safeguard critical businesses processes.

Key takeaways:

  • Learn how and why attackers target business processes
  • Gain an insight into the impact of BPC on your organization
  • The steps you can take to protect your critical business processes


Photo of Jon Clay

Jon Clay

Director Global Threat Communications, Trend Micro

Photo of Tiernan Connolly

Tiernan Connolly

Senior Manager, EY

Photo of Maxine Holt

Maxine Holt

Research Director, Ovum

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Trend Micro here: https://www.trendmicro.com/en_gb/about/trust-center/privacy.html. Please see Infosecurity Magazine’s privacy policy for more information.