Targeting the top: how cybercriminals are getting personal

From exploiting digital footprints to weaponising advanced AI, online fraudsters are expanding their toolkit. Is it time for senior executives to watch their step?

Although the C-suite can be a tough nut to crack, the potential payouts from a successful whaling attack – one that targets top-level executives - can make cracking it well worth a fraudster’s time.

Sign up to our content service and access now

    Opt In?

    Explore similar content


    Protecting FSIs as risk management stakes grow

    This whitepaper provides valuable insights on protecting financial institutions from growing risk management stakes, including the impact of new guidelines and the emergence of fintech relationships.
    Whitepaper Financial Management Cyber Risk Management
    Pure Storage

    Strengthening Operational Resilience in Financial Services

    "Operational disruptions can cause wide-reaching harm to consumers and pose a risk to market integrity, threaten the viability of firms, and cause instability in the financial system."- Financial Conduct Authority True resilience encompasses the entire ecosystem, with a focus on the data and technology that underpins modern business. This recently published white paper breaks down the key components of operational and cyber resilience regulations and the best practices for addressing them. - Changing Scope and Cost of Risk Management - Focus on Critical Infrastructure and Services - Cyber Security Front and Center
    Ebook Cyber Risk Management

    Using zero trust to build secure architectures for an edge-to-cloud world

    As the theft of digital information has become a pervasive global threat, cybersecurity has moved to center stage. With the right mix of integrated security design and constant monitoring of your users,devices, systems, apps, and data, you can improve your security posture and prevent cyberattacks before they impact your organization By embracing a data-driven and zero-trust approach holistically across your organization, you canmake a cultural shift to prioritize cybersecurity as a critical factor in your data-first modernization efforts. In this paper, HPE defines “zero trust” and explains how it can empower organizations with:
    Blog Cyber Risk Management Cyber Security