Business Email Compromise: Why It Works - and How to Prevent It

Mike Britton of Abnormal Security on How to Approach the BEC Solution
Mike Britton, CISO, Abnormal Security

Business email compromise: We know it's coming, we educate our employees, and yet the schemes still succeed far too often. Mike Britton, CISO of Abnormal Security, talks about why BEC schemes are so pervasive - and how organizations can better protect themselves from becoming the next victim.

In this video interview with Information Security Media Group, Britton discusses:

  • Why BEC schemes are so pervasive;
  • What we have learned about adversaries and how they gather intel;
  • How organizations can prevent these attacks.

Britton is the CISO of Abnormal Security, where he leads information security and privacy programs. Prior to Abnormal, he spent six years as the CSO and chief privacy officer for Alliance Data. He has 25 years of information security, privacy, compliance and IT experience in a variety of Fortune 500 global companies.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.