Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
RSS
Channel info
Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network
Channel

Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

Truth in IT
08/15/2019

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

 

In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.

Roger will show you:

  • How detailed data is harvested using public databases and surprising techniques

  • Tricks used to craft a compelling social engineering attack that your users WILL click

  • Cunning ways hackers deliver malicious code to take control of an endpoint

  • Taking over your domain controller and subsequently your entire network

But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.

Categories:
  • » Data Management » Converged Infrastructure
  • » Cybersecurity » Network Security
  • » Webinar Library » KnowBe4
  • » Cybersecurity » Endpoint Security
Tags:

...

...
../../....
...
... (...%)
  • Share
    • Channel
    • Video
  • Comments
    • Channel
    • Video
  • Download
  • Transcript
Report Like Favorite

Channel

  • Share/Embed
Link
Embed

Video

  • Share/Embed
  • Email
Link
Embed

Current Video Transcript


...
Show more Show less

Playlist Video Transcriptions


Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

                Channel's Comments: Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

                Upcoming Webinar Calendar

                • 04/21/2026
                  02:00 PM
                  04/21/2026
                  How Purpose Brands scales IT with Zendesk ITAM
                  https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
                • 04/22/2026
                  01:00 PM
                  04/22/2026
                  Evolving Service Account Security: Transitioning from Legacy to Agentic Identities in AI
                  https://www.truthinit.com/index.php/channel/1885/evolving-service-account-security-transitioning-from-legacy-to-agentic-identities-in-ai/
                • 04/22/2026
                  01:00 PM
                  04/22/2026
                  Harnessing the Power of AI for Rapid Advancements
                  https://www.truthinit.com/index.php/channel/1892/harnessing-the-power-of-ai-for-rapid-advancements/
                • 04/23/2026
                  01:00 PM
                  04/23/2026
                  Cultivating Trust as a Foundation for the Agentic Consumer in 2026
                  https://www.truthinit.com/index.php/channel/1883/cultivating-trust-as-a-foundation-for-the-agentic-consumer-in-2026/
                • 04/29/2026
                  12:00 PM
                  04/29/2026
                  Strategies for Safeguarding AI in Applications, Agents, and APIs
                  https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
                • 04/30/2026
                  10:00 AM
                  04/30/2026
                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                  https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
                • 04/30/2026
                  01:00 PM
                  04/30/2026
                  The New Economics of VMware Exit
                  https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
                • 05/06/2026
                  02:00 AM
                  05/06/2026
                  Harnessing AI to Identify Attacks Before They Evolve into Breaches
                  https://www.truthinit.com/index.php/channel/1886/harnessing-ai-to-identify-attacks-before-they-evolve-into-breaches/
                • 05/06/2026
                  10:00 PM
                  05/06/2026
                  World Password Day: Strategies for Managing Your Passwords Effectively
                  https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
                • 05/07/2026
                  05:00 AM
                  05/07/2026
                  World Password Day: Strategies for Managing Your Passwords Effectively
                  https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
                • 05/07/2026
                  01:00 PM
                  05/07/2026
                  World Password Day: Strategies for Managing Your Passwords Effectively
                  https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
                • 05/12/2026
                  01:00 PM
                  05/12/2026
                  Transforming Black Box Mysteries into Transparent Insight: Addressing AI Risks through Data Lineage
                  https://www.truthinit.com/index.php/channel/1895/transforming-black-box-mysteries-into-transparent-insight-addressing-ai-risks-through-data-lineage/
                • 05/12/2026
                  11:30 PM
                  05/12/2026
                  Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                  https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/

                Upcoming Events

                • Apr
                  21

                  How Purpose Brands scales IT with Zendesk ITAM

                  04/21/202602:00 PM ET
                  • Apr
                    22

                    Evolving Service Account Security: Transitioning from Legacy to Agentic Identities in AI

                    04/22/202601:00 PM ET
                    • Apr
                      22

                      Harnessing the Power of AI for Rapid Advancements

                      04/22/202601:00 PM ET
                      • Apr
                        23

                        Cultivating Trust as a Foundation for the Agentic Consumer in 2026

                        04/23/202601:00 PM ET
                        • Apr
                          29

                          Strategies for Safeguarding AI in Applications, Agents, and APIs

                          04/29/202612:00 PM ET
                          More events
                          Truth in IT
                          • Sponsor
                          • About Us
                          • Terms of Service
                          • Privacy Policy
                          • Contact Us
                          • Preference Management
                          Desktop version
                          Standard version