Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network
Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network
What you'll learn
The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.
In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.
Roger will show you:
- How detailed data is harvested using public databases and surprising techniques
- Tricks used to craft a compelling social engineering attack that your users WILL click
- Cunning ways hackers deliver malicious code to take control of an endpoint
- Taking over your domain controller and subsequently your entire network
But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
Roger Grimes
Data-Driven Defense Evangelist
KnowBe4
Bio info: Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and...
Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.
Details

Event Type : On Demand
Date : Nov 13, 2019 01:00 PM CT
Cost : Complimentary
Credits : CPHIMS, CAHIMS
Speaker(s) : Roger Grimes
RegisterInvite a friend
Related content
-
Feb 18, 2021
-
Top Cybersecurity Priorities for Healthcare in 2021
The healthcare industry is a prime target for cyberattacks....
Learn moreCost
$0.00 Non-member
$0.00 Member
Jan 28, 2021
-
Ransomware: To Pay or Not to Pay
With ransomware attacks increasing at U.S. hospitals,...
Learn moreCost
$0.00 Non-member
$0.00 Member
Jan 26, 2021
-
Let’s Talk Insider Threats
An insider leaking patient records at a doctor’s office...
Learn moreCost
$0.00 Non-member
$0.00 Member
Nov 17, 2020
-
Securing Telemedicine in a Post-COVID World
Telemedicine is here to stay, even in a post-COVID world....
Learn moreCost
$0.00 Non-member
$0.00 Member
Oct 13, 2020
-
Cyber Protection for Healthcare Data: Beyond the Pandemic
Healthcare leaders talked about digital transformation for...
Learn moreCost
$0.00 Non-member
$0.00 Member
Oct 07, 2020
-
The Interoperability Rule - an Open Opportunity
How can healthcare providers and payers turn a compliance...
Learn moreCost
$0.00 Non-member
$0.00 Member
Sep 29, 2020