Attendees will hear several real-world examples highlighting how BPC works, such as the Antwerp Seaport shipping container system hack that allowed cybercriminals to reroute and smuggle drugs. They will also learn about a compromised cargo system controlled by the Australian Customs and Border Protection Service agency. These stories will help illustrate how enterprises with limited visibility of the risks associated with business processes can be easy targets.
Finally, the session will outline specific steps that organisations can take to recognize and defend against Business Process Compromise. The speaker will demonstrate how security technologies like application control can lock down access to mission-critical terminals while endpoint protection detects malicious lateral movement. He will also explain why strong policies and practices regarding social engineering must be part of an organisation’s defence plan.
5 benefits to the audience of attending your presentation
- Understand how Business Process Compromise attacks work
- Hear lessons learned through case study examples of BPC
- Learn to recognize the signs of possible BPC attacks
- Find out which industries are most vulnerable to this type of intrusion
- Hear practical steps that will help protect your organisation from this type of attack
Dr Morton Swimmer
Senior Threat Researcher, Trend Micro FTR
Schedule some time with our team >
How can Trend Micro help with designing a security blueprint for hybrid cloud infrastructure?
Book a meeting with – Bill McGee, Senior Vice President – Cloud & Data Centre Security, Trend Micro
What does business process compromise mean for my business and where can Trend Micro help?
Book a meeting with – Dr Morton Swimmer, Senior Threat Researcher, Trend Micro FTR (Forward Looking Threat Research)