Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't! We will explore 12 ways hackers can and do get around your favorite MFA solution. The webinar includes real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.
In an environment of increased outsourcing, cloud computing adoption, and regulatory requirements, how do you manage vendor risk and ensure you have a consistent evaluation life cycle? In this webinar, James McQuiggan, KnowBe4’s Security Awareness Advocate, will show you actionable steps you can use now to better manage your third-party vendor risk.
Today’s phishing attacks have evolved way beyond spray-and-pray emails that mass target victims. Instead, the bad guys have carefully researched your organization in order to set the perfect trap. And pretexting is the key. In this webinar Kevin Mitnick shows how the bad guys craft such cunning attacks.
Tax season is upon us, which makes this prime time for hackers to target your unsuspecting users with the latest Business Email Compromise (BEC) scams. In this webinar Erich Kron and James McQuiggan, KnowBe4 Security Awareness Advocates, discuss the new types of BEC scams you can expect to see, what your users should be on alert for this tax season, and how to protect your organization from these evolved threats.
Because third-party phishing attacks look like legitimate emails from your vendors’ domains, traditional defenses often don't work against them or they are severely weakened. Your only defense is a strong human firewall. Join Erich Kron to find out how third-party phishing attacks operate, how you can spot them, and learn what defenses do and don't work against them.
Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. One way to reduce risks and identify security/privacy risk is to conduct a data privacy impact assessment.
Three experts. 10 hot topics. Sixty minutes. What happens when you lock highly opinionated security awareness experts in a room with a microphone and a list of top security issues facing your organization? This is your chance to find out!
Did you know that even when DMARC, SPF and DKIM are enabled, 81% of phishing attacks still continue to sail right through to the end-user? Let Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, teach you how to enable DMARC, SPF, DKIM the right way, and learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.
Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows. In this mind-blowing webinar, Kevin and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, give you an inside look into some of Kevin’s most prized, underground OSINT secrets and how the bad guys use those techniques to target your users and your organizations.
You know that "security awareness" is key to a comprehensive security strategy. But just because someone is aware doesn't mean they care. So how can you design programs that work with, rather than against, human nature? Here's the great news. Creating a security awareness strategy that not only educates but reinforces good behaviors can be achieved and we'll show you how.
Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, covers a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait.
Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer, Kevin Mitnick.
This is the true story of an IT Manager who was tired of his users clicking on everything and wanted to teach them a lesson… in a good way. Find out what happens, when you stop being polite and start getting real. The Real World: New-School Security Awareness Training!
KnowBe4's Founder & CEO, Stu Sjouwerman, along with Chief Evangelist & Strategy Officer, Perry Carpenter, take you into the future of social engineering and cybercrime. Stu and Perry will give you a run-down of the big themes of 2018 and then dive deep into their predictions of what you need to prepare your organization and people for next year. You can't afford to miss this one.
Cryptomining infections are growing exponentially this year. Bad guys are hijacking your network processing power to steal your workstation and server resources. They are using various families of malware trying to stay under your radar.
The bad guys are getting very creative, impersonating an executive in your organization and asking for financial reports or they ask employees in payroll to make changes to bank accounts. According to the FBI, their efforts have earned them an estimated $12 billion through Business Email Compromise also known as CEO fraud scams. Defending against these types of phishing attacks is possible by layering technical and non-technical controls.
Attackers follow a number of paths as they search for entry-points into your organization. Join Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and former Gartner Research Analyst, in this practical session providing a high-level overview of the theory/practices used, showing you how to simulate those same tactics using both free and subscription-based aspects of KnowBe4's platform.
Recently, the news has been packed with W-2 phishing and CEO fraud, also known as "Business Email Compromise" attacks, costing companies over 3.4 billion dollars in 2017. Per a new “urgent alert” issued by the U.S. Internal Revenue Service, internet criminals have now combined both schemes and at the same time are targeting a much wider range of organizations than ever before. Join Erich Kron to look at scary features of the new threats of W-2 phishing and CEO fraud, give actionable info that you need to prevent infections, and what to do when you are hit.
KnowBe4 recently commissioned Forrester to conduct a Total Economic Impact? (TEI) study, examining the potential Return on Investment (ROI) enterprises might realize by implementing KnowBe4. How does 127% ROI with a one-month payback sound?
Join Stu Sjouwerman and Perry Carpenter as they provide fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, They'll look at how to ethically use the very same levers when educating our users.
With 91% of data breaches being the result of human error, security leader, auditors, and regulators are increasingly focused on creating an effective security awareness and training program that focuses on the human side of security. Join our guest speaker, Nick Hayes from Forrester Research, and KnowBe4's own Perry Carpenter for results-focused strategies and insight for building a world class security awareness training program.
Watch this insider’s perspective of cybersecurity trends to expect in 2018 from our founder Stu Sjouwerman. The list of six predictions are founded on KnowBe4’s deep insight into threats that organizations experience today and should expect tomorrow.
In this 30-minute webinar Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will look at scary features of new ransomware strains and give you 5 strategies you can implement now to help you prevent ransomware and how to fortify your last line of defense—your end users.
While reported numbers fluctuate from industry study to industry study, they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ – but they often don’t know where to start.