Skip to Main Content

BEC Basics: Your First Step to Thwarting Email Scams

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate organizations through Microsoft 365. Staying ahead of these threats requires organizations to fully grasp (and take advantage of) the security controls and configurations available in the Microsoft 365 ecosystem.

By Steven Erwin and Olivia Cate
September 25, 2024
Incident Response & Forensics

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate organizations through Microsoft 365. Staying ahead of these threats requires organizations to fully grasp (and take advantage of) the security controls and configurations available in the Microsoft 365 ecosystem.

During this webinar, the following technical areas will be covered:

  • Microsoft 365 License levels and associated limitations/issues
  • Log sources and accompanying data
  • Common evidence location(s)

Join Senior Security Consultant Steven Erwin and Security Consultant Olivia Cate as they cover the basics of BEC analysis, providing participants with foundational knowledge to effectively identify and combat BEC threats in a Microsoft 365 environment. Attendees will have an opportunity to engage in Q&A with our investigators and leave the webinar with the skills to pinpoint critical logs and artifacts essential for detecting suspicious activities, including unauthorized authentications, data exfiltration, and malicious inbox and forwarding rules.

Whether you're new to BEC analysis, looking to refine your skills, or just plain curious about BECs in the wild, this session will provide practical guidance to help you better protect your digital environment.