Hi [[ session.user.profile.firstName ]]

About KnowBe4

KnowBe4 delivers ‘new-school’ security awareness training combined with set-it-and-forget-it simulated phishing attacks for an extremely effective user education program.
Recorded Jun 22 2016 2 mins
Your place is confirmed,
we'll send you email reminders
Presented by
KnowBe4
Presentation preview: About KnowBe4

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network Recorded: Jul 22 2019 61 mins
    Roger Grimes
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the “Cyber Kill Chain” in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:
    How detailed data is harvested using public databases and surprising techniques
    Tricks used to craft a compelling social engineering attack that your users WILL click
    Cunning ways hackers deliver malicious code to take control of an endpoint
    Taking over your domain controller and subsequently your entire network
    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use Recorded: Jun 28 2019 70 mins
    Kevin Mitnick, Perry Carpenter
    Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows.

    The truth is that it is shockingly easy to gather detailed intelligence on individuals and organizations. Everything the bad guys need to specifically target your end users is out there for the taking. Banking and credit card accounts, driver's license numbers, geolocation details and even IT secrets can be found easily and through public resources! There’s even a name for it: Open Source Intelligence (OSINT).

    In this mind-blowing webinar, Kevin and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, give you an inside look into some of Kevin’s most prized, underground OSINT secrets and how the bad guys use those techniques to target your users and your organizations.

    Find out what to watch out for and learn how to strengthen your end-user “human firewall” against OSINT-fueled attacks before it's too late!
  • Security Awareness: Securing the Human Layer Recorded: Jun 28 2019 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Jun 28 2019 68 mins
    Roger Grimes
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Your Ultimate Guide to Phishing Mitigation Recorded: Jun 28 2019 62 mins
    Roger Grimes
    Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait.

    This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, covers a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We didn't just cover one angle. We’ll came at it from all angles!

    Join Roger as he dives deep to teach you how to develop a comprehensive, defense-in-depth plan, introduces technical controls all organizations should consider, covers the benefits of new-school security awareness training, and goes over the best practices for creating and implementing security policies, all while staying phish-free!
  • Security Awareness: Securing the Human Layer Recorded: Jun 14 2019 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Jun 14 2019 68 mins
    Roger Grimes
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Hacking Data Sources That Bad Guys Use, Revealed by Kevin Mitnick Recorded: May 31 2019 3 mins
    Perry Carpenter
    Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows. And he'll share those secrets with you on this upcoming webinar. Register at: https://event.on24.com/wcc/r/1987306/120DACBD77DBFB3669AC398388105E40?partnerref=BrightTALK
  • 12 Ways to Defeat Multi-Factor Authentication Recorded: May 24 2019 62 mins
    Roger Grimes
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution.

    The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Would You Take the Bait? Top Phishing Email Subjects Users Are Clicking On Recorded: May 8 2019 47 mins
    Erich Kron, Mitchell Milligan, Justin Ong
    The greatest risk to the security of your company isn’t just hackers. It’s the users who let the bad guys get access to your network without even knowing it! Creating a security awareness training program that really works means training and phishing your users with real-world scenarios. You have to start phishing like the bad guys!

    In this Spiceworks Video Meetup we discuss KnowBe4’s most recent phishing benchmark report to see how you stack up across your industry, the latest trends in phish scams, and the power of effective new-school security awareness training.

    Here’s what we discuss:
    - Top email and social media topics to test your users on, and how to phish like the bad guys
    - Looking at phishing vulnerability by industry
    - How to develop and re-assess your security awareness training strategy to ensure your users create a human firewall
  • What Keeps IT Pros Like You Up At Night Recorded: Apr 24 2019 63 mins
    Nick Cavalancia, Erich Kron
    When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. The problem is that cybercriminals are constantly evolving their tradecraft, becoming more daring, sophisticated, and successful at cyberattacks and making it increasingly difficult for IT to keep the bad guys out. 

    With so many possible issues for you to address, what do other IT pros like you really have a handle on and what’s keeping them lying awake at night?

    In this informative webcast, cybersecurity expert and Microsoft MVP, Nick Cavalancia, and Erich Kron, KnowBe4's Security Awareness Advocate, as they discuss the results of KnowBe4’s 2019 What Keeps You Up At Night Report.

    Topics include:
    - Attack Types
    - Security Initiatives
    - Compliance vs. Security
    - User-Related Issues
    - Resource Issues
    - Executive-Level Concerns
  • 12 Ways to Defeat Multi-Factor Authentication Recorded: Apr 22 2019 62 mins
    Roger Grimes
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution.

    The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Human Firewalls: Fact or Fiction Recorded: Apr 10 2019 112 mins
    Erich Kron, Mitch Parker, Dominick Frazier
    Looking at the current cyber attacks it's clear that ransomware, phishing, CEO Fraud / W-2 scams are on the rise costing organizations billions of dollars in 2018 alone. It got us thinking what security measures are actually effective with this ever-changing threat landscape? Are technological defenses enough? Is it really necessary or feasible for you to train and test users to the point of becoming a human firewall? Is a human firewall even helpful if antivirus, firewalls, email security, etc. are already in place?

    Join our team of experts as we discuss the advantages and disadvantages of a technology-only approach and whether end users can actually be trained to the point of reducing organizational risk. Learn the facts, so you can decide how best to invest your time and money to make sure your organization gets the best bang out of your security budget buck.
  • Security Awareness: Securing the Human Layer Recorded: Apr 5 2019 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • Top 5 IT Security Myths Your CISO Believes Are True… BUSTED! Recorded: Mar 20 2019 64 mins
    Roger Grimes, Erich Kron
    Facts are facts… but what happens when IT security pros take myths at face value?

    That got us thinking… what if we whip out our magnifying glasses, pull out the trench coats and use our research skills to differentiate fact from fiction? That's exactly what we did for this interactive webinar where we dug deep to help you decide how to invest your time and money wisely, how to implement worthwhile defenses, and what holes to plug so your organization gets the best bang for your security budget buck.

    Listen in as Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and Erich Kron, KnowBe4’s Security Awareness Advocate, uncover the truth behind the Top 5 IT Security Myths. They’re stating facts and slinging stats. Then the audience decides whether each myth is confirmed or BUSTED!
  • An Inside View Into the Methods & Exploits of Kevin Mitnick Recorded: Mar 14 2019 63 mins
    Kevin Mitnick, Perry Carpenter
    Many of the world's most reputable organizations rely on Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, to uncover their most dangerous security flaws. Kevin’s experience as a security consultant and his vast knowledge of social engineering are part of what help you train your users to stay a step ahead of the bad guys.

    Wouldn’t it be great if you had insight into the latest threats and could find out “What would Kevin do”? Now you can!

    In this webinar you will:

    - Watch an exclusive demo of a shocking Outlook Exchange exploit
    - Find out how these vulnerabilities may affect your organization
    - Learn what you can do to stop the bad guys (What Would Kevin Do)
  • Hidden In Plain Sight: Open Source Intelligence on the Rise Recorded: Mar 12 2019 33 mins
    Erich Kron, Stephen Lawton
    It’s all out there in the open — essentially the ways and means for bad actors to attack your company. There’s even a label for it: Open Source Intelligence.

    This is the underlying data that will help attackers create convincing attack emails with personal information and details about a target’s life so detailed that the attack appears to come from your best friend.

    This 20/20 webcast looks at how attackers use details about you either to attack you or to attacker others and make them think it’s from you — and what you can do about it.
  • Levers of Human Deception: The Science and Methodology Behind Social Engineering Recorded: Mar 7 2019 51 mins
    Erich Kron, David Littman
    No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

    Join Erich Kron, Security Awareness Advocate for KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, We'll look at how to ethically use the very same levers when educating our users.

    Key Takeaways:
    The Perception Vs. Reality Dilemma
    - Understanding the OODA (Observe, Orient, Decide, Act) Loop
    - How social engineers and scam artists achieve their goals by subverting - OODA Loop's different components
    - How we can defend ourselves and our organizations
  • The Real World: New-School Security Awareness Training... From the Trenches Recorded: Feb 13 2019 63 mins
    Erich Kron, KnowBe4's Security Awareness Advocate & Tory Dombrowski, IT Manager at Takeform
    This is the true story of an IT Manager who was tired of his users clicking on everything and wanted to teach them a lesson… in a good way. Find out what happens, when you stop being polite and start getting real. New-school Security Awareness Training!

    In this "From the Trenches" event, we’ll talk with Tory Dombrowski, IT Manager at Takeform and KnowBe4 customer, about his experiences and lessons learned while designing and delivering a security awareness training plan for his users.

    Erich Kron, KnowBe4's Security Awareness Advocate, and Tory will dive deep to share best practices and creative ideas, so you know what to expect when executing your own program.

    In this webinar you'll learn:
    Why it's so important to empower your users to become a "human firewall"
    What it's really like to get executive buy-in and implement security awareness training and simulated phishing

    The good, the bad and the truly hilarious results of training and testing your users
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Jan 24 2019 68 mins
    Roger Grimes, Data-Driven Defense Evangelist
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: About KnowBe4
  • Live at: Jun 22 2016 4:00 pm
  • Presented by: KnowBe4
  • From:
Your email has been sent.
or close