The Rise of BEC: Are Your Users Getting Swindled?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

By now most of us have heard or seen the Netflix documentary ‘The Tinder Swindler.’ Romance scams are scary and looking from the outside, we often see the obvious signs.

Business Email Compromise (BEC) is one component of an intricate crime network, which has links to romance scams. This attack vector is particularly damaging, with FBI figures showing it caused more than $1.8bn worth of losses to businesses in 2020.

Therefore, organizations and individuals alike must be fully aware of this tactic, how to identify it and take action to prevent this threat. In this webinar, a panel of experts will explain the history of BEC, how it’s linked to romance scams and what you can do to protect your organization and end users.

Join this session to learn:

  • The history of BEC and how this tactic has evolved
  • How to identify these scams, including whether family members are caught up in this network
  • Steps that you can take to mitigate this threat, including tools, processes and end user training


Simon Clark

Director, FortNet UK

James Coker

Deputy Editor, Infosecurity Magazine

Tonia Dudley

Strategic Security Advisor, Cofense

    Jake Moore

    Global Cybersecurity Advisor, ESET

    Ronnie Tokazowski

    Principal Threat Advisor , Cofense

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Cofense's privacy policy here: Please see Infosecurity Magazine’s privacy policy for additional information.