Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW
RSS
Channel info
Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network
Channel

Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

Truth in IT
08/15/2019

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

 

In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.

Roger will show you:

  • How detailed data is harvested using public databases and surprising techniques

  • Tricks used to craft a compelling social engineering attack that your users WILL click

  • Cunning ways hackers deliver malicious code to take control of an endpoint

  • Taking over your domain controller and subsequently your entire network

But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.

Categories:
  • » Data Management » Converged Infrastructure
  • » Cybersecurity » Network Security
  • » Webinar Library » KnowBe4
  • » Cybersecurity » Endpoint Security
Tags:

...

...
../../....
...
... (...%)
  • Share
    • Channel
    • Video
  • Comments
    • Channel
    • Video
  • Download
  • Transcript
Report Like Favorite

Channel

  • Share/Embed
Link
Embed

Video

  • Share/Embed
  • Email
Link
Embed

Current Video Transcript


...
Show more Show less

Playlist Video Transcriptions


Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

                Channel's Comments: Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

                Upcoming Webinar Calendar

                • 05/06/2026
                  02:00 AM
                  05/06/2026
                  Detecting Attacks Before They Escalate into Breaches with AI's Help
                  https://www.truthinit.com/index.php/channel/1886/detecting-attacks-before-they-escalate-into-breaches-with-ais-help/
                • 05/06/2026
                  10:00 PM
                  05/06/2026
                  World Password Day: Strategies for Managing Your Existing Passwords
                  https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-existing-passwords/
                • 05/07/2026
                  05:00 AM
                  05/07/2026
                  World Password Day: Strategies for Managing Your Passwords Effectively
                  https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
                • 05/07/2026
                  01:00 PM
                  05/07/2026
                  World Password Day: Next Steps for Managing Your Passwords Effectively
                  https://www.truthinit.com/index.php/channel/1915/world-password-day-next-steps-for-managing-your-passwords-effectively/
                • 05/12/2026
                  01:00 PM
                  05/12/2026
                  Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                  https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
                • 05/12/2026
                  11:30 PM
                  05/12/2026
                  Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks
                  https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-risks/
                • 05/13/2026
                  01:00 AM
                  05/13/2026
                  Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                  https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
                • 05/13/2026
                  05:00 AM
                  05/13/2026
                  Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                  https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
                • 05/19/2026
                  01:00 PM
                  05/19/2026
                  Spring of Satori: A Deep Dive into 2026's Threat Landscape and Insights
                  https://www.truthinit.com/index.php/channel/1930/spring-of-satori-a-deep-dive-into-2026s-threat-landscape-and-insights/
                • 05/19/2026
                  01:00 PM
                  05/19/2026
                  Establishing AI Governance Foundations for GenAI at Every Deployment Stage
                  https://www.truthinit.com/index.php/channel/1936/establishing-ai-governance-foundations-for-genai-at-every-deployment-stage/
                • 05/21/2026
                  11:00 AM
                  05/21/2026
                  The Autonomous Era: Orchestrating a Resilient Enterprise
                  https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
                • 05/27/2026
                  04:00 AM
                  05/27/2026
                  Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                  https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
                • 05/28/2026
                  10:00 AM
                  05/28/2026
                  Harnessing AI: Transforming Perception into Purposeful Mastery
                  https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transforming-perception-into-purposeful-mastery/

                Upcoming Events

                • May
                  06

                  Detecting Attacks Before They Escalate into Breaches with AI's Help

                  05/06/202602:00 AM ET
                  • May
                    06

                    World Password Day: Strategies for Managing Your Existing Passwords

                    05/06/202610:00 PM ET
                    • May
                      07

                      World Password Day: Strategies for Managing Your Passwords Effectively

                      05/07/202605:00 AM ET
                      • May
                        07

                        World Password Day: Next Steps for Managing Your Passwords Effectively

                        05/07/202601:00 PM ET
                        • May
                          12

                          Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage

                          05/12/202601:00 PM ET
                          More events
                          Truth in IT
                          • Sponsor
                          • About Us
                          • Terms of Service
                          • Privacy Policy
                          • Contact Us
                          • Preference Management
                          Desktop version
                          Standard version