Hi [[ session.user.profile.firstName ]]

KnowBe4

  • Date
  • Rating
  • Views
  • Would You Take the Bait? Top Phishing Email Subjects Users Are Clicking On
    Would You Take the Bait? Top Phishing Email Subjects Users Are Clicking On
    Erich Kron, Mitchell Milligan, Justin Ong Recorded: May 8 2019 47 mins
    The greatest risk to the security of your company isn’t just hackers. It’s the users who let the bad guys get access to your network without even knowing it! Creating a security awareness training program that really works means training and phishing your users with real-world scenarios. You have to start phishing like the bad guys!

    In this Spiceworks Video Meetup we discuss KnowBe4’s most recent phishing benchmark report to see how you stack up across your industry, the latest trends in phish scams, and the power of effective new-school security awareness training.

    Here’s what we discuss:
    - Top email and social media topics to test your users on, and how to phish like the bad guys
    - Looking at phishing vulnerability by industry
    - How to develop and re-assess your security awareness training strategy to ensure your users create a human firewall
  • What Keeps IT Pros Like You Up At Night
    What Keeps IT Pros Like You Up At Night
    Nick Cavalancia, Erich Kron Recorded: Apr 24 2019 63 mins
    When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. The problem is that cybercriminals are constantly evolving their tradecraft, becoming more daring, sophisticated, and successful at cyberattacks and making it increasingly difficult for IT to keep the bad guys out. 

    With so many possible issues for you to address, what do other IT pros like you really have a handle on and what’s keeping them lying awake at night?

    In this informative webcast, cybersecurity expert and Microsoft MVP, Nick Cavalancia, and Erich Kron, KnowBe4's Security Awareness Advocate, as they discuss the results of KnowBe4’s 2019 What Keeps You Up At Night Report.

    Topics include:
    - Attack Types
    - Security Initiatives
    - Compliance vs. Security
    - User-Related Issues
    - Resource Issues
    - Executive-Level Concerns
  • 12 Ways to Defeat Multi-Factor Authentication
    12 Ways to Defeat Multi-Factor Authentication
    Roger Grimes Recorded: Apr 22 2019 62 mins
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution.

    The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Human Firewalls: Fact or Fiction
    Human Firewalls: Fact or Fiction
    Erich Kron, Mitch Parker, Dominick Frazier Recorded: Apr 10 2019 112 mins
    Looking at the current cyber attacks it's clear that ransomware, phishing, CEO Fraud / W-2 scams are on the rise costing organizations billions of dollars in 2018 alone. It got us thinking what security measures are actually effective with this ever-changing threat landscape? Are technological defenses enough? Is it really necessary or feasible for you to train and test users to the point of becoming a human firewall? Is a human firewall even helpful if antivirus, firewalls, email security, etc. are already in place?

    Join our team of experts as we discuss the advantages and disadvantages of a technology-only approach and whether end users can actually be trained to the point of reducing organizational risk. Learn the facts, so you can decide how best to invest your time and money to make sure your organization gets the best bang out of your security budget buck.
  • Security Awareness: Securing the Human Layer
    Security Awareness: Securing the Human Layer
    Roger Grimes, Scott Lowe Recorded: Apr 5 2019 59 mins
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • Top 5 IT Security Myths Your CISO Believes Are True… BUSTED!
    Top 5 IT Security Myths Your CISO Believes Are True… BUSTED!
    Roger Grimes, Erich Kron Recorded: Mar 20 2019 64 mins
    Facts are facts… but what happens when IT security pros take myths at face value?

    That got us thinking… what if we whip out our magnifying glasses, pull out the trench coats and use our research skills to differentiate fact from fiction? That's exactly what we did for this interactive webinar where we dug deep to help you decide how to invest your time and money wisely, how to implement worthwhile defenses, and what holes to plug so your organization gets the best bang for your security budget buck.

    Listen in as Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and Erich Kron, KnowBe4’s Security Awareness Advocate, uncover the truth behind the Top 5 IT Security Myths. They’re stating facts and slinging stats. Then the audience decides whether each myth is confirmed or BUSTED!
  • An Inside View Into the Methods & Exploits of Kevin Mitnick
    An Inside View Into the Methods & Exploits of Kevin Mitnick
    Kevin Mitnick, Perry Carpenter Recorded: Mar 14 2019 63 mins
    Many of the world's most reputable organizations rely on Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, to uncover their most dangerous security flaws. Kevin’s experience as a security consultant and his vast knowledge of social engineering are part of what help you train your users to stay a step ahead of the bad guys.

    Wouldn’t it be great if you had insight into the latest threats and could find out “What would Kevin do”? Now you can!

    In this webinar you will:

    - Watch an exclusive demo of a shocking Outlook Exchange exploit
    - Find out how these vulnerabilities may affect your organization
    - Learn what you can do to stop the bad guys (What Would Kevin Do)
  • Hidden In Plain Sight: Open Source Intelligence on the Rise
    Hidden In Plain Sight: Open Source Intelligence on the Rise
    Erich Kron, Stephen Lawton Recorded: Mar 12 2019 33 mins
    It’s all out there in the open — essentially the ways and means for bad actors to attack your company. There’s even a label for it: Open Source Intelligence.

    This is the underlying data that will help attackers create convincing attack emails with personal information and details about a target’s life so detailed that the attack appears to come from your best friend.

    This 20/20 webcast looks at how attackers use details about you either to attack you or to attacker others and make them think it’s from you — and what you can do about it.
  • Levers of Human Deception: The Science and Methodology Behind Social Engineering
    Levers of Human Deception: The Science and Methodology Behind Social Engineering
    Erich Kron, David Littman Recorded: Mar 7 2019 51 mins
    No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

    Join Erich Kron, Security Awareness Advocate for KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, We'll look at how to ethically use the very same levers when educating our users.

    Key Takeaways:
    The Perception Vs. Reality Dilemma
    - Understanding the OODA (Observe, Orient, Decide, Act) Loop
    - How social engineers and scam artists achieve their goals by subverting - OODA Loop's different components
    - How we can defend ourselves and our organizations
  • The Real World: New-School Security Awareness Training... From the Trenches
    The Real World: New-School Security Awareness Training... From the Trenches
    Erich Kron, KnowBe4's Security Awareness Advocate & Tory Dombrowski, IT Manager at Takeform Recorded: Feb 13 2019 63 mins
    This is the true story of an IT Manager who was tired of his users clicking on everything and wanted to teach them a lesson… in a good way. Find out what happens, when you stop being polite and start getting real. New-school Security Awareness Training!

    In this "From the Trenches" event, we’ll talk with Tory Dombrowski, IT Manager at Takeform and KnowBe4 customer, about his experiences and lessons learned while designing and delivering a security awareness training plan for his users.

    Erich Kron, KnowBe4's Security Awareness Advocate, and Tory will dive deep to share best practices and creative ideas, so you know what to expect when executing your own program.

    In this webinar you'll learn:
    Why it's so important to empower your users to become a "human firewall"
    What it's really like to get executive buy-in and implement security awareness training and simulated phishing

    The good, the bad and the truly hilarious results of training and testing your users

Embed in website or blog