Participants will learn how to recognize, respond, and minimize their exposure to cyber criminals leveraging Business Email Compromise (BEC), Ransomware or Extortionware tactics. Fundamental methodologies cyber criminals leverage during a BEC campaign, and the varieties of BEC schemes are presented. Participants will learn the difference between phishing and BEC, and the difference between ransomware and extortionware. Numerous end-user defense techniques are offered to improve end-user recognition of these malicious tactics.
Please attend the Recognizing Social Engineering presentation (NCJCTF-705) before joining this discussion, as social engineering tactics are exploited frequently in these crimes. This presentation is designed for employees at all echelons of an organization. Leaders, managers, supervisors and front line employees are encouraged to attend.
Details |
Date(s) |
Fri. Oct 25, 2024 1000-1130
|
Location |
Online Delivery See Offering Specific Information for details, OTHER NC
Google Map
|
Handicap Accessibility |
Yes
|
WiFi Access |
|
Offered By |
North Carolina Division of Emergency Management |
Primary Instructor |
TBD, To Be Determined |
Course Length |
|
Course Hours |
1 |
CEUs |
|
Award Credentials |
|
Prerequisites |
|
Equivalent Prerequisites |
|
Target Audience |
SLTT / CI Information Technology or Information Assurance personnel, Business & Functional area managers/supervisors, employees with financial disbursement authority. |
Maximum Participants |
200 |
# Open Seats |
196 |
# on Wait List |
1 |