Video
C5capital SoundbitesAre you a Target? How Cyber Criminals are using personal information to target High Net-Worth Individuals, Family Offices & Corporate Executives

Hosted by C5 Capital

The underground breach economy is booming and exposed identity information could make you a target.

As the volume of personal information that is stolen and sold online increases, the dynamics of cyberattacks have shifted dramatically. Increasingly, high-profile and high net-worth individuals and their families are being targeted not only for cyber theft but for impersonation and disinformation campaigns.

Industry experts Luke Wilson, VP of Intelligence at 4iQ and Luke Gorman, US Practice Lead at ITC Secure led a fascinating discussion on how personal identities are traded online, what is at risk and how you can protect yourself, your family, and your company’s executives from becoming targets of identity-based cyberattacks.

Watch the full playback below to discover trends affecting executive cybersecurity, what to look out for on social media, how not to over-share, and the importance of securing IoT and smart home devices.

Recorded May 20th, 2020 | 60 minutes

C5capital Soundbites
Are you a Target? How Cyber Criminals are using personal information to target High Net-Worth Individuals, Family Offices & Corporate Executives

Hosted by C5 Capital

The underground breach economy is booming and exposed identity information could make you a target.

As the volume of personal information that is stolen and sold online increases, the dynamics of cyberattacks have shifted dramatically. Increasingly, high-profile and high net-worth individuals and their families are being targeted not only for cyber theft but for impersonation and disinformation campaigns.

Industry experts Luke Wilson, VP of Intelligence at 4iQ and Luke Gorman, US Practice Lead at ITC Secure led a fascinating discussion on how personal identities are traded online, what is at risk and how you can protect yourself, your family, and your company’s executives from becoming targets of identity-based cyberattacks.

Watch the full playback below to discover trends affecting executive cybersecurity, what to look out for on social media, how not to over-share, and the importance of securing IoT and smart home devices.

Recorded May 20th, 2020 | 60 minutes