BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Biltmore Area Partnership - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Biltmore Area Partnership
X-ORIGINAL-URL:https://biltmoreareapartnership.com
X-WR-CALDESC:Events for Biltmore Area Partnership
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Phoenix
BEGIN:STANDARD
TZOFFSETFROM:-0700
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20250101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Phoenix:20260528T113000
DTEND;TZID=America/Phoenix:20260528T130000
DTSTAMP:20260430T005239
CREATED:20260228T180851Z
LAST-MODIFIED:20260428T190639Z
UID:5054-1779967800-1779973200@biltmoreareapartnership.com
SUMMARY:BAP Luncheon at The Gladly — Phoenix Police Financial Crimes: Cyber Fraud in Business
DESCRIPTION:Join the Biltmore Area Partnership for our May luncheon at The Gladly\, featuring speakers from the Phoenix Police Department’s Financial Crimes Detail. They will cover the latest cyber fraud trends impacting businesses\, how scams are evolving\, and practical steps business owners and managers can take to reduce risk. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nWhat you’ll learn:\n\n\n\n\nTop cyber fraud schemes hitting businesses today: Business Email Compromise (BEC)\, invoice fraud\, AI-generated phishing\, and vendor impersonation—responsible for billions in losses annually\, including identity theft and forgery cases handled by Phoenix Police Financial Crimes Detail.\n\n\n\nHow criminals exploit email\, payments\, and vendors: Attackers hijack email threads\, spoof trusted contacts with deepfakes or forged invoices\, and insert fake QR codes to divert funds or steal credentials.\n\n\n\nKey warning signs to train your team on: Urgent payment requests from “executives\,” slight email address mismatches\, unexpected invoice changes\, or attachments from familiar vendors—phishing causes 85% of breaches.\n\n\n\nImmediate prevention steps: Enable multi-factor authentication\, verify payments via phone\, conduct regular fraud training\, update software\, and use firewalls—simple actions that block most attacks.\n\n\n\nResponse if victimized: Isolate systems\, change passwords\, notify banks/police/FTC/IC3 immediately\, and inform customers to limit damage and support investigations.\n\n\n\n\nThis is a must-attend session for business owners\, managers\, finance teams\, and anyone responsible for customer data\, payments\, or internal systems. \n\n\n\n\n\n\n\nEvent Venue:
URL:https://biltmoreareapartnership.com/event/bap-luncheon-gladly-cyber-fraud-may-28-2026/
LOCATION:The Gladly Restaurant\, 2201 E Camelback Road\, Phoenix\, Arizona\, 85016\, United States
CATEGORIES:BAP Luncheons
ATTACH;FMTTYPE=image/jpeg:https://biltmoreareapartnership.com/wp-content/uploads/2025/03/the-gladly.jpg
END:VEVENT
END:VCALENDAR