-
Business-Email-Compromise-Guide
The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Office 365 environment. Each step is intended to guide the process of identifying, collecting and analysing activity associated with BEC intrusions.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
I've written my own internal business email compromise plan, which just covers e-mail - but may be a good start for you. I can't share my own plan, but I found a very good guide from PwC that's publicly available on GitHub: https://github.com/PwC-IR/Business-Email-Compromise-Guide