Business Email Compromise (BEC) , Fraud Management & Cybercrime , Video

Business Email Compromise: Secret Service on How to Respond

Federal Law Enforcement Agents Offer Tips on Improving Detection, Rapid Response
Stephen Dougherty and Michael Johns, U.S. Secret Service

Ransomware gets the headlines, and phishing sets off the most alerts, but business email compromise costs enterprises the most - more than $43 billion since 2016. U.S. Secret Service agents Stephen Dougherty and Michael Johns discuss the criticality of rapid detection and response.

See Also: Live Webinar | How To Meet Your Zero Trust Goals Through Advanced Endpoint Strategies

In this video interview with Information Security Media Group, the two agents open up on:

  • Current BEC trends - the latest tactics;
  • Why speed of response is more critical than ever to recover lost funds;
  • The value of trusted partnerships with law enforcement before the crime is committed.

Dougherty has over 15 years of investigative experience. He is currently a financial investigator/forensic analyst assigned to the U.S. Secret Service's Global Investigative Operations Center. As a financial fraud investigator in support of the federal government, Dougherty has played a pivotal role in criminal investigations surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud and dark web crimes.

Johns is the director of private and public sector outreach for the Cyber Security ASAIC- Criminal Investigative Division, U.S. Secret Service.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.