Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses.

But with a strategic approach to cyber defense, you can hack the hacker before they strike! In this session, we'll share insights into their strategies and their motivations. You'll learn how to use that understanding, along with simple strategies to make your organization a hard target.

Join Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, for this new webcast as he exposes the mind of a hacker to help you see your cyber risks from the outside in.

In this session, you will learn:

•  How hackers collect "private" details about your organization and users
•  The most common root causes that lead to damaging cyberattacks
•  Common mistakes made when designing cyber defenses, and how to fix them
•  Data-driven strategies for mitigating your biggest weaknesses
•  Why a strong human firewall is your best, last line of defense

Get the details you need to know now to outsmart cybercriminals before you become their next victim.

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
Speakers
speaker photo
Roger Grimes
Data-Driven Defense Evangelist, KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

Moderator
speaker photo
Tom Bechtold
Digital Events Director, SecureWorld
Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.