They are out there, watching and waiting for an opportunity to strike—the bad actors who have carefully researched your organization in order to set the perfect trap using easily found public resources. Open-Source Intelligence (OSINT) can provide cybercriminals everything they need to know to perfectly target your users by gathering data on everything from password clues to tech stack details, banking/credit card accounts, social media details, and more. Emerging technologies like AI can make gathering this intelligence even easier.

Join Rosa Smothers, former CIA Cyber Threat Analyst and Technical Intelligence Officer, now KnowBe4's SVP of Cyber Operations, as she reveals the OSINT techniques employed by cybercriminals that can help you protect your organization before disaster strikes.

In this special Cybersecurity Awareness webcast, you will learn:

•  What apps and analytic techniques can help you better understand the data you're collecting

•  Real-world demonstrations of how to conduct (legal!) OSINT gathering techniques the hackers are using on you

•  How to deploy penetration testing exercises to map an attack surface

•  How to conduct cyber investigations of your own

•  And how understanding OSINT and training your users can help build your human firewall

Learn how to use the cybercriminals' best techniques before they do!

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
speaker photo
Rosa Smothers
SVP, Cyber Operations, KnowBe4

Throughout my career—including experience in a CIO-equivalent role with the CIA—I have continually focused on ensuring unfailing, 24/7 enterprise IT security while also closely monitoring the bottom line and implementing continuous improvements to operational efficiency.

As a seasoned executive leader, I excel at partnering with C-suite management and cross-functional teams to formulate enterprise security strategy in alignment with overarching business goals. Additionally, I have built, guided and mentored numerous high-caliber, multidisciplinary teams, consistently demonstrating my capacity for leading with empathy while streamlining teams for optimal performance.

With a history of piloting large-scale restructuring efforts to ensure robust, highly secure enterprise IT infrastructures, I have triggered dramatic savings for large-scale organizations. Further, I am a fiscally savvy decision maker adept at line-by-line analysis of multimillion-dollar IT security budgets and at facilitating negotiations with key vendors to secure cost-effective resources.

speaker photo
Tom Bechtold
Digital Events Director, SecureWorld
Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.