The average person believes using Multi-Factor Authentication (MFA) makes them significantly less likely to be hacked. That is simply not true! Hackers can bypass 90-95% of MFA solutions much easier than you would think. Using a regular looking phishing email, they can bypass MFA just as easily as if it were a simple password.

Join Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist for this new webinar to learn common MFA hacking techniques and what it takes to make your MFA phishing resistant. He’ll also share a pre-filmed MFA hacking demo from Kevin Mitnick, KnowBe4’s Chief Hacking Officer.

In this webinar you’ll learn:

• Government recommendations for effective MFA

• Characteristics that make MFA easily hackable

• Features you should look for in a strong MFA solution

• Which phish-resistant MFA you should be using

• Why a strong human firewall is your best, last line of defense

Get the information you need to know now to better defend your network.

Attendees eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
Speakers
speaker photo
Roger Grimes
Data-Driven Defense Evangelist, KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

Moderator
speaker photo
Tom Becthtold
Digital Event Director, SecureWorld

Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.