Identify How Cyber Criminals Use Generative AI in Business Email Compromise (BEC) Attacks

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Understanding how cybercriminals exploit generative AI technologies, like OpenAI's ChatGPT, to mount sophisticated Business Email Compromise (BEC) attacks is the first step in determining if you have the right defense-in-depth strategy.

There are more than 20 different classifications of BEC attacks. The progression of generative AI technologies has introduced a new vector for BEC attacks, expanding the possibilities and variation of these attacks.

Cybercriminals use this technology to automate the creation of highly convincing phishing emails personalized to the recipient, significantly increasing the chances of a successful attack.

Join this webinar to:

  • Peer into the world of a cybercriminal forum to sneak a peek at the Hacker’s Guide to Writing Professional Phishing Emails
  • See real-world examples of many different classifications of BEC attacks
  • Gain tips on how to determine if you are protected from these types of attacks


Photo of Jeff Baker

Jeff Baker

Director of Solutions Engineering, SlashNext

Photo of Chris  McGowan

Chris McGowan

Principal Information Security Professional Practices, ISACA

Photo of Zaira Pirzada

Zaira Pirzada

Advisor - Lionfish Tech Advisors

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for SlashNext here: Please see Infosecurity Magazine’s privacy policy for more information.