Рет қаралды 15,329
Office 365, or O365, has made online applications easier for businesses of all sizes. Its also created a significant attack vector that attackers have been exploiting for years to the tune of BILLIONS a year. Business Email Compromise, or BEC, is the name given to these types of email-based attacks that have cost businesses over $12 billion, and show little sign of slowing down. It's time we turn the tables.
In this webcast, we will examine how and why O365 has become such a successful attack vector. Specifically, we are going to examine examples of spoofed and fraudulent emails and how the attackers work to understand the flow of money within your organization. We will also be going to look at attacker infrastructure and examine sample code that they use to pilfer credentials from your organization.
We are not stopping there we will also talk about how you can defend yourself against these attacks. We've got a brand new tool to release for O365 log analysis - OLAF. We will also talk about what you can do inside O365 RIGHT NOW to protect yourselves against these types of attacks.
Listen to this packed session of attacker tactics, log analysis, defensive mechanisms, and more!
About the presenter:
Matt Bromiley is a SANS Certified Digital Forensics and Incident Response instructor, teaching Advanced Digital Forensics, Incident Response, and Threat Hunting (FOR508: www.sans.org/course/advanced-... ) and Advanced Network Forensics: Threat Hunting, Analysis, and Incident Response (FOR572: www.sans.org/course/advanced-..., and a GIAC Advisory Board member. He is also a principal incident response consultant at a major incident response and forensic analysis company, combining experience in digital forensics, incident response/triage and log analytics. His skills include disk, database, memory and network forensics, as well as network security monitoring. Matt has worked with clients of all types and sizes, from multinational conglomerates to small, regional shops. He is passionate about learning, teaching and working on open source tools.