Would Attackers Target Your Organisation to Manipulate Your Business Processes?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Business process compromise (BPC) is a stealthy attack on target networks giving the attacker the ability to manipulate processes without being discovered. Attacker behaviour is focused, there is deep recognisance, stealthy intrusion techniques and colonisation across many key processes.

However, where many targeted attacks go straight for the data asset (IP or financial data), BPC attacks manipulate legitimate processes and refocus them for the attackers gain.

Such examples have been seen in the manipulation of financial processes (as seen in the Bangladesh Bank heist) as well as drug cartels targeting logistics systems to allow free flow of containers.

As businesses become ever more connected through IOT and complex supply chains, could BPC emerge as one of the biggest cyber-risks facing businesses?

This webinar will look at the risks presented by BPC and the measures companies can take to safeguard critical businesses processes.

Key takeaways:

  • Learn how and why attackers target business processes
  • Gain an insight into the impact of BPC on your organization
  • The steps you can take to protect your critical business processes


Jon Clay

Director Global Threat Communications, Trend Micro

    Tiernan Connolly

    Senior Manager, EY

      Maxine Holt

      Research Director, Ovum

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. Please see Trend Micro's privacy policy here: https://www.trendmicro.com/en_gb/about/trust-center/privacy.html. Please see Infosecurity Magazine’s privacy policy for additional information.