It feels like we hear about a new devastating cyberattack in the news every day. And attack methods seem to be proliferating at an exponential rate. So, which tactics should you be aware of beyond standard "click and infect" attack vectors?

Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and popular cybersecurity author for this eye-opening webinar. Roger will share his take on several significant, advanced, and yes, crazy cyberattacks he’s seen in the wild. Plus, he'll share defensive strategies you'll want to implement to prevent them from affecting your network.You'll see examples of 10 amazing hacks showing how:

• Your users' passwords can be cracked in mere minutes

• Cybercriminals easily bypass Multi-Factor Authentication

• Automated malware can devastate your network

• Hackers can completely take over your network with a few simple steps

• And more!

Find out what you can do to mitigate these advanced hacking techniques instead of becoming the next unknowing victim. 

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
Speakers
speaker photo
Roger Grimes
Data-Driven Defense Evaneglist, KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

Moderator
speaker photo
Tom Bechtold
Digital Events Director, SecureWorld
Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.