Hi [[ session.user.profile.firstName ]]

KnowBe4

  • Date
  • Rating
  • Views
  • My Friend, My Enemy
    My Friend, My Enemy Erich Kron CISSP, Security Awareness Advocate Recorded: Feb 22 2018 31 mins
    It’s always nice to find a kindred spirit — someone who knows what you know and likes what you like. The problem today is that kindred spirit whom you think is your friend might well be your worst enemy. One of the most effective tools attackers use to breach everything from high-security networks and physical installations to your most closely held secrets is social engineering. This webinar looks at how social engineering works, why it works as well as it does, how to identify an attack and what to do if you think you’ve been compromised.
  • Strains of CEO Fraud: Urgent Request for W-2s - Fireside Chat with TruthInIT
    Strains of CEO Fraud: Urgent Request for W-2s - Fireside Chat with TruthInIT Erich Kron CISSP, Security Awareness Advocate Recorded: Feb 15 2018 53 mins
    Soon the news will be packed with W-2 phishing and CEO fraud, also known as "Business Email Compromise" attacks. The cost of these attacks against organizations totaled over 5.3 billion dollars.

    Each year the U.S. Internal Revenue Service warns about these scams where internet criminals successfully combine W-2 and CEO fraud schemes, targeting a much wider range of organizations than ever before.

    What's next and how can you protect your organization? Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, for our Truth in IT webinar “Strains Of CEO Fraud: Urgent Request for W-2s”. We will look at scary features of the new blended and current threats of W-2 phishing and CEO fraud, give actionable info that you need to prevent infections, and what to do when you are hit.
  • Counter the Careless Click, Tools to Help You Train Your Users
    Counter the Careless Click, Tools to Help You Train Your Users Erich Kron CISSP, Security Awareness Advocate Recorded: Jan 25 2018 36 mins
    Cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employee training is tied as the third-most-effective method (higher than antivirus) of decreasing the cost of a data breach.*

    Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization.

    Join this 30-minute webinar “Counter the careless click, tools to help you train your users” where Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will provide a practical session with tips and free tools you can implement now to help you create your “human firewall”.

    Erich will cover:

    * Current threat landscape
    * Top 5 tips for security awareness
    * How to easily create your security awareness program
    * Outlining how and where tools are helpful

    * Based on recent research by the Ponemon Institute
  • How to Social Engineer Your Users Into More Secure Behavior
    How to Social Engineer Your Users Into More Secure Behavior Erich Kron CISSP, Security Awareness Advocate Recorded: Jan 12 2018 41 mins
    In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers understand that the user is the weakest link in the security chain. Email phishing campaigns have proven to be the path of least resistance for getting unsuspecting individuals to download and install their malicious software. Getting users to identify phishing attacks and training them not to click on links in email messages is not a trivial task.

    In this webinar, you’ll learn the strategies and techniques that social engineers are finding success with. You’ll also learn how to
    implement an effective security awareness program that focuses on preventing socially engineered attacks and how to validate the results of your training with simulate phishing campaigns.
  • Phishing and Social Engineering in 2018: Is the Worst Yet to Come?
    Phishing and Social Engineering in 2018: Is the Worst Yet to Come? Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Dec 5 2017 36 mins
    Ransomware has tipped the 1 billion mark and damages are expected to be around 5 billion before the year is out. Use of ransomware has evolved throughout the year with a 600% rise in URL emails delivering malware in just Q3 2017. CEO fraud (aka BEC) has cost another 5 billion according to the FBI as of May 2017. What's next and how can you protect your organization?

    Join Security Awareness Advocate at KnowBe4, Erich Kron, for this 60-minute webinar “Phishing and Social Engineering in 2018: Is the Worst Yet to Come?”. Stu will discuss some of the latest trends in cybercrime and give you an insider's perspective on what to expect for 2018 and how to prepare for it.

    Key topics covered in this webinar:
    Understanding the current threat landscape
    What scary new threats will be on the rise for 2018
    Next innovations of ransomware, phishing and social engineering
    What you can do to make your organization a harder target for cybercrime
    How to create your “human firewall”
  • Your Organization Through the Eyes of an Attacker 
    Your Organization Through the Eyes of an Attacker  Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 Recorded: Nov 30 2017 41 mins
    Attackers follow a number of paths as they search for entry-points into your organization. In this webinar, we'll show you easy ways to stalk and attack your organization to improve security. This will be a practical session providing a high-level overview of the theory/practices used, and then showing you how to simulate those same tactics using both free and subscription-based aspects of KnowBe4’s platform.

    Join security awareness expert Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and former Gartner Research Analyst for this 30-minute webinar “Your Organization Through the Eyes of an Attacker."

    Perry will cover these topics:
    • Understanding the attacker's workflow
    • Selecting targets and entry points
    • How to create your own 'Red Team' activities using KnowBe4 as part of a penetration testing initiative and/or to promote a culture of security awareness
  • Top 5 Strategies to Prevent Ransomware
    Top 5 Strategies to Prevent Ransomware Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Nov 29 2017 45 mins
    It's been a "Ransomware Horror Show”. If you've been in the IT trenches over the past year, you've probably noticed that announcements of new ransomware strains are accelerating and there is no end in sight.
    In this webinar “Top 5 Strategies to Prevent Ransomware” Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will look at scary features of new ransomware strains and give you 5 strategies you can implement now to help you prevent ransomware.

    Key topics covered in this webinar:
    •The new scary Ransomware trends out in the wild
    •How to eliminate or reduce damage from ransomware
    •How to fortify your last line of defense—your end users
  • Ransomware: The Billion-dollar Innovation Industry 
    Ransomware: The Billion-dollar Innovation Industry  Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Nov 28 2017 48 mins
    Since ransomware exploded on the scene, the bad guys are constantly coming out with new versions of ransomware strains to evade detection. Having earned a billion dollars in 2016, they have the resources to keep innovating and now ransomware is being leveraged in ways it has never been before.
     
    Join us for this 45-minute webinar as we discuss the latest innovations in ransomware and how you can reduce damage from ransomware and fortify your last line of defense—your end users.

    Key topics covered in this webinar:
    • How Ransomware started
    • What led to its explosion in growth
    • Where Ransomware is heading
    • Techniques for dealing with Ransomware
    • How to create a "Human Firewall"
  • How To Phish Like The Bad Guys
    How To Phish Like The Bad Guys Erich Kron, CISSP Security Awareness Advocate, KnowBe4, Inc. Recorded: Oct 24 2017 50 mins
    In spite of all the spectacular news stories about advanced persistent threats and targeted hacks from nation-states, the most common security challenge facing enterprises today continues to be social engineering. Successful hackers understand that the user is the weakest link in the security chain. Email phishing campaigns have proven to be the path of least resistance to get unsuspecting individuals to download and install their malicious software. Getting users to identify phishing attacks and training them not to click on links in email messages is not a trivial task.

    In this webinar, you’ll learn the strategies and techniques that social engineers are finding success with. You’ll also learn how to implement these techniques, to create real-world simulated phishing emails to test your employees and see how phish-prone they really are.

    Key topics covered in this webinar:
    - Latest phishing attacks strategies and techniques
    - Some of the top-clicked phishing emails from Q3-2017
    - How to use these tactics when creating simulated phishing emails to test your user
  • Making the Executive Decision for Security Awareness Training
    Making the Executive Decision for Security Awareness Training Erich Kron CISSP, Security Awareness Advocate, KnowBe4 Recorded: Sep 21 2017 46 mins
    Cyber Security is on everybody’s minds these days. You can’t log in to your favorite web-based news site, it seems, without seeing a warning about ransomware, spear phishing, social engineering attacks or CEO fraud. Attackers have all the time in the world to create very targeted attacks, yet employees have seconds to decide if they will open an email, click on an attachment or even worse, install an “upgrade” supposedly sent by their IT department or software vendor.

    Today’s 20/20 panel discussion webcast will focus what you can do to train not only your users, but also your management team about these threats and how they can defend against them.

Embed in website or blog