Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Would Attackers Target Your Organisation to Manipulate Your Business Processes?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Business process compromise (BPC) is a stealthy attack on target networks giving the attacker the ability to manipulate processes without being discovered. Attacker behaviour is focused, there is deep recognisance, stealthy intrusion techniques and colonisation across many key processes.

However, where many targeted attacks go straight for the data asset (IP or financial data), BPC attacks manipulate legitimate processes and refocus them for the attackers gain.

Such examples have been seen in the manipulation of financial processes (as seen in the Bangladesh Bank heist) as well as drug cartels targeting logistics systems to allow free flow of containers.

As businesses become ever more connected through IOT and complex supply chains, could BPC emerge as one of the biggest cyber-risks facing businesses?

This webinar will look at the risks presented by BPC and the measures companies can take to safeguard critical businesses processes.

Key takeaways:

  • Learn how and why attackers target business processes
  • Gain an insight into the impact of BPC on your organization
  • The steps you can take to protect your critical business processes

Speakers

Jon Clay

Director Global Threat Communications, Trend Micro

    Tiernan Connolly

    Senior Manager, EY

      Maxine Holt

      Principal Analyst, Information Security Forum

      Dan  Raywood

      Contributing Editor, Infosecurity Magazine

      Brought to You by