Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
RSS
Channel info
Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network
Channel

Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

Truth in IT
08/15/2019

The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

 

In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.

Roger will show you:

  • How detailed data is harvested using public databases and surprising techniques

  • Tricks used to craft a compelling social engineering attack that your users WILL click

  • Cunning ways hackers deliver malicious code to take control of an endpoint

  • Taking over your domain controller and subsequently your entire network

But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.

Categories:
  • » Data Management » Converged Infrastructure
  • » Data Management » Networking
Tags:

...

...
../../....
...
... (...%)
  • Share
    • Channel
    • Video
  • Comments
    • Channel
    • Video
  • Download
  • Transcript
Report Like Favorite

Channel

  • Share/Embed
Link
Embed

Video

  • Share/Embed
  • Email
Link
Embed

Current Video Transcript


...
Show more Show less

Playlist Video Transcriptions


Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

              Channel's Comments: Hacking Your Organization: 7 Steps Bad Guys Use to Take Total Control of Your Network

              Upcoming Spotlight Events

              • Jul
                16

                How Privileged Access Really Works in Modern Windows Environments

                07/16/202501:00 PM ET
                • Jul
                  29

                  QR Codes Exposed: From Convenience to Cybersecurity Nightmare

                  07/29/202501:00 PM ET
                  More events

                  Upcoming 360 View Events

                  • Jul
                    24

                    360View: API Security & the Expanding Attack Surface

                    07/24/202512:00 PM ET
                    • Aug
                      21

                      360View: HCI, Cloud, and Virtualization: What’s Next?

                      08/21/202512:00 PM ET
                      • Sep
                        25

                        360View: Email Security & Social Engineering Defense

                        09/25/202512:00 PM ET
                        More events

                        Upcoming Industry Events

                        • Jul
                          10

                          Discover the Latest Features of Netwrix 1Secure for MSPs

                          07/10/202501:00 PM ET
                          • Jul
                            23

                            Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                            07/23/202501:00 PM ET
                            More events

                            Recent Industry Events

                            • Jun
                              26

                              Discover Wallarm's Innovative Approach to Safeguarding Modern APIs and Agentic AI

                              06/26/202501:00 PM ET
                              • Jun
                                25

                                Adapting to Emerging Threats: Strategies for Detection, Response, and Resilience

                                06/25/202501:00 PM ET
                                • Jun
                                  04

                                  Rubrik FORW>>RD

                                  06/04/202501:00 PM ET
                                  More events
                                  Truth in IT
                                  • Advertise
                                  • About Us
                                  • Terms of Service
                                  • Privacy Policy
                                  • Contact Us
                                  • Be Our Guest
                                  • Preference Management
                                  Desktop version
                                  Standard version