An organization's sensitive financial data was recently exfiltrated in a targeted cyber attack. Following an investigation, it was determined that an employee inadvertently installed a keylogger on their workstation after falling for a spear-phishing email that appeared to come from the company's CEO. Based on this scenario, what is the MOST probable motivation behind this attack?
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts