10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys
10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys
What you'll learn
Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Roger will teach you:
- How silent malware launches, remote password hash capture, and how rogue rules work
- Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
- Details behind clickjacking and web beacons
- Actionable steps on how to defend against them all
If all you were worried about were phishing attempts, think again!
Roger Grimes
Data-Driven Defense Evangelist
KnowBe4
Bio info: Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and...
Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.
Details

Event Type : On Demand
Date : Mar 20, 2019 12:00 PM CT
Cost : Complimentary
Credits : CPHIMS, CAHIMS
Speaker(s) : Roger Grimes
RegisterInvite a friend
Related content
-
Module 4: Security, Privacy and Confidentiality
In this module, you will learn how to 1) Recognize that...
Learn moreCollection Cost
$225.00 Non-member
$180.00 Member
Feb 19, 2015
-
What Does 'HIPAA Compliant' Mean?
Organizations may claim that they or their product or...
Learn moreCollection Cost
$149.00 Non-member
$149.00 Member
Apr 13, 2015
-
Ensuring Compliance When Working with Third-Party Providers
With HIPAA now putting first-hand responsibility for...
Learn moreCollection Cost
$149.00 Non-member
$149.00 Member
Apr 13, 2015
-
Challenges Working With or Being a HIPAA Business Associate
The HITECH Act and the Omnibus Rule have brought into sharp...
Learn moreCollection Cost
$149.00 Non-member
$149.00 Member
Apr 13, 2015
-
Privacy & Security: Opportunities and Challenges of Computab
Join the Office of the National Coordinator for Health IT...
Learn moreCollection Cost
$149.00 Non-member
$149.00 Member
Apr 13, 2015
-
The Role of Security Monitoring and SIEM in Risk Management
Network security breaches often take weeks, months or even...
Learn moreCollection Cost
$149.00 Non-member
$149.00 Member
May 01, 2015
-
There's An App For That!
The growth of mobile medical applications development and...
Learn moreCollection Cost
$149.00 Non-member
$149.00 Member
May 01, 2015
-
HIPAA Security: A Decade of Breaches
The HIPAA Security Rule is now nearly 10 years old, and the...
Learn moreCollection Cost
$149.00 Non-member
$149.00 Member
May 01, 2015
-
Preparing for a New Level of HIPAA Enforcement
The session will present information on the increasing...
Learn moreCollection Cost
$149.00 Non-member
$149.00 Member
May 01, 2015
-
Selecting the Right CISO and Building the Security Office
This session will describe best practices for selecting the...
Learn moreCollection Cost
$149.00 Non-member
$149.00 Member
May 01, 2015