Cybersecurity tabletop exercise webinar series: Business email compromise
Join us for a multiday interactive webinar series in collaboration with Harrisburg University: Starting on Monday, March 30, 2026 1:00 – 2:00 PM ET through April 2, 2026 1:00 – 2:00 PM ET.

Join us for an interactive 4-day cybersecurity tabletop simulation on business email compromise.
Course Summary
This four-day tabletop exercise in collaboration with Harrisburg University addresses Business Email Compromise (BEC) attacks targeting county government finance departments, with specific emphasis on cross-departmental coordination and response. The scenario unfolds over 4 consecutive days (Monday through Thursday) through daily Zoom webinars and online homework. Each day brings new developments in the scenario and requires participants to adapt their response strategies in real-time.
- Day 1 (Monday, March 30, 2026 1:00 – 2:00 PM ET): Scenario orientation
- Day 2 (Tuesday, March 31, 2026 1:00 – 2:00 PM ET): First set of attack and response details
- Day 3 (Wednesday, April 1, 2026 1:00 – 2:00 PM ET): Escalation and additional response details
- Day 4 (Thursday, April 2, 2026 1:00 – 2:00 PM ET): Real-life stories, a wrap-up, and lessons learned
Each daily webinar includes new scenario developments that participants must address, simulating the dynamic nature of actual cybersecurity incidents.
Participants will identify security gaps. They will come away with strategies to review or create incident response policy and procedures, clarify departmental roles and responsibilities, and develop communication protocols for sharing findings with key stakeholders, including elected officials, department heads, legal counsel, and external partners.
Learning Objectives
Upon completion of this cyber simulation, participants will receive a certificate of completion and will be able to:
- Identify and assess BEC attack vectors and indicators
- Implement/review verification procedures for financial transactions and wire transfers
- Coordinate incident response across finance, IT, legal, administration, and communications departments
- Execute proper notification procedures to financial institutions, law enforcement, and oversight agencies
- Assess data breach implications including vendor information and payment history exposure
- Develop communication strategies for internal and external stakeholders
- Review and update financial controls and cybersecurity policies
Participation Instructions:
- Please complete all required fields in the registration form.
- A link to the online platform and scenario with resources will be emailed five days prior to the event
- After registering, you’ll receive a confirmation email with the Zoom webinar link and a multi-day calendar invitation. Note that this same link will be used for all 4 webinars.
- On the day of each webinar, please join with the same email you used to register initially.
- After the conclusion of each webinar, you’ll receive an email with the Zoom webinar recording. Attendance is mandatory to receive a certificate of completion. If you are unable to attend, please plan to register and view for the on-demand webinar recording to continue with the simulation.
Accessibility Accommodations: CAI is dedicated to accessible events. If you need an accommodation to enjoy this experience, please submit your request to accessibility@cai.io or (888) 824 – 8111.
Our speakers


