Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Workshop: Investigating M365 Business Email Compromise with Patterson Cake

Course Authored by .

Join us for this pay-what-you-can, hands-on, virtual workshop from Antisyphon Instructor, Patterson Cake on investigating M365 business email compromise.

Live Training $25 - $150

Course Length: 4 Hours

Includes a Certificate of Completion



Next scheduled date: October 17th, 2025 @ 11:00 AM EDT

Description

Join us for this pay-what-you-can, hands-on, virtual workshop from Antisyphon Instructor, Patterson Cake on investigating M365 business email compromise.

Over 90% of cyber attacks begin with a phishing email. Despite end-user education efforts, implementation of multi-factor authentication, and advanced email filtering, successful business email compromise (BEC) is on the rise!  Join us for this pay-what-you-can, hands-on, virtual workshop from Antisyphon Instructor, Patterson Cake on investigating M365 business email compromise.  Patterson will review threat-actor BEC standard operating procedures, discuss detecting and investigating M365 BEC, and perform hands-on labs using M365 native functions and SOF-ELK for “Unified Audit Log” (UAL) ingestion and investigations.

System Requirements
  • Hardware/Software Requirements
    • x86 architecture CPU clocked at 2 GHz or higher that is capable of nested virtualization (Apple Silicon is currently not supported)
    • A computer with at least 8 GB of RAM. 16 GB is recommended
    • VMWare Workstation or VMWare Fusion (VirtualBox and other VM software is not supported)
    • Full Administrator/root access to your computer or laptop
    • System should also have at least 50GB of available disk space to accommodate one VM
    • Internet access to download the course VM (approx. 5 GB)
  • Lab Requirements (To make the most of this workshop, please complete the following before the workshop begins:)
    • Download the course lab virtual machine (links and instructions below)
    • Download and complete the “lab setup” guide (link below)
    • Join the BHIS “webcast-live-chat” Discord Channel - https://discord.gg/BHIS 
    • The workshop will be presented via Zoom…and discussion/support will be provided through Discord!
    • You can complete the workshop labs using the course VM and a browser on your host computer.
  • Download and run Local VM
    • To use the M365 BEC Workshop VM, you will need either VMWare Workstation or VMWare Player (links to downloads/trials are in the setup guide). The VM requires approx. 50 GB of total disk space, utilizes 4 CPU/4 GB RAM by default, and has NAT enabled.
    • IMPORTANT: The M365 BEC Workshop virtual machine will NOT run on ARM-based processors (Apple Silicon/M1/M2). You will need a computer with an x64 processor.
    • Virtual Machine Download (approx. 5 GB): https://securecake.nyc3.cdn.digitaloceanspaces.com/m365_bec/M365-BEC-SOF-ELK.ovaLab Setup Guide:  https://securecake.nyc3.cdn.digitaloceanspaces.com/m365_bec/START-HERE-VM-Setup-Guide.pdf

Syllabus

    • The Anatomy of an M365 Business Email Compromise (BEC)
        • Common Characteristics of Current M365 BEC Attacks

        • Common Characteristics of Current M365 BEC Attacks

        • Threat-Actor BEC Standard Operating Procedures (SOP)

    • BEC Investigative Methodology
        • Deriving Indicators of Compromise (IOCs) from SOPs

        • Reviewing M365 Log & Audit Data

    • Introduction to SOF-ELK
        • Exporting and Investigating M365 Data with SOF-ELK

        • SOF-ELK Tips, Tricks & Queries (hands-on lab)

    • An M365 BEC Case Study
        • An Overview of the M365 “Unified Audit Log” (UAL)

        • Investigating an M365 BEC Case Using SOF-ELK and the M365 UAL (hands-on lab)

FAQ

Pre-Requisites
Student Knowledge:  A basic familiarity with M365 is beneficial but not required.

About the Instructor

Pixel splash background
Patterson Cake
Bio

Patterson Cake joined the Black Hills Information Security (BHIS) pirate ship in June of 2023 as a Security Analyst focusing primarily on detection engineering and digital forensics and incident response. He chose BHIS because, to paraphrase, “doing cool stuff with cool people” and “making the world a better/safer place” is exactly how he wants to spend his professional time and energy. It also helps that he has a bit of history with a couple of awesome folks that have been with BHIS for many moons. Prior to joining the team, Patterson helped build and lead a DFIR practice for an MSSP, worked as a senior security engineer for AWS Managed Services, and spent several years in enterprise cybersecurity, often healthcare related, focusing on intermingling offensive security and incident response in technical and leadership roles. Outside of work, he enjoys spending time with his family, which often involves motorcycles, outdoor sports, movies, and music.

Register for Upcoming

  • Filter by Product Date
  • Filter by Product Instructor
  • Filter by Product Type

Workshop: Investigating M365 Business Email Compromise with Patterson Cake

Complete Package

Live Training Patterson Cake

Virtual

Includes:

Certificate of participation, six months access to class recordings and our appreciation.

Pay Forward What You Can

Live Training Patterson Cake

Virtual

Includes:

Certificate of participation, six months access to class recordings and our appreciation.

Pay Forward What You Can

Live Training Patterson Cake

Virtual

Includes:

Certificate of participation, six months access to class recordings and our appreciation.

Pay Forward What You Can

Live Training Patterson Cake

Virtual

Includes:

Certificate of participation, six months access to class recordings and our appreciation.

Pay Forward What You Can

Live Training Patterson Cake

Virtual

Includes:

Certificate of participation, six months access to class recordings and our appreciation.

Content is loading, please wait.
Content is loading, please wait.
$25 - $150
October 17th, 2025 11:00 AM EDT - 4:00 PM EDT

Registration End Date: 10:00 PM, EDT October 16th 2025

Shopping Cart

No products in the cart.