Hi [[ session.user.profile.firstName ]]

End of Year - The Perfect Storm for Phishing Attacks

Phishing, spearphishing and Business Email Compromise (BEC) attacks are forecasted to grow exponentially in 2019. But…the end of 2018 poses the perfect storm trifecta of threats: the holidays, start of tax season and a very busy time for end of year transactions. We are bringing together two of the industry’s top thought leaders in the email security space, Michael Osterman, Principal Analyst of Osterman Research and Erich Kron, Security Awareness Advocate of KnowBe4 to update us on what to look out for in 2018 and how to head into 2019 unscathed. In this webcast we cover:

- Things to look out for specifically this time of year w/the holidays, tax season, W2 fraud, end of year, etc.
- Predictions for 2019 phishing/email malware attacks
- Really strange 1-off experiences that we’ve seen that you should be aware of
- How to prepare yourself and build your human firewall and reinforce the weakest link of most organizations

Watch for an information packed session with research and analysis you can’t get anywhere else on this topic!
Recorded Dec 10 2018 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Erich Kron, Michael Osterman, David Littman
Presentation preview: End of Year - The Perfect Storm for Phishing Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Setting the Trap: Crafty Ways the Bad Guys Use Pretexting to Own Your Network Recorded: Sep 11 2019 2 mins
    Kevin Mitnick, Perry Carpenter
    Today’s phishing attacks have evolved way beyond spray-and-pray emails that mass target victims. Instead, the bad guys have carefully researched your organization in order to set the perfect trap. And pretexting is the key.

    Whether it’s a phone call from an attacker impersonating your IT department or what seems like an innocuous email that ends up harvesting important credentials, the perfect pretext can lead to the bad guys owning your network before you know it.
    Join us for this exclusive webinar where Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, will show you how the bad guys craft such cunning attacks. They'll dig into tactics for reconnaissance, target selection, creating a pretext, and launching an attack. And more importantly, they will tell you what you need to know to protect your organization.

    Kevin will also share new demonstration videos that will blow your mind! This is one webinar you can't afford to miss! www.KnowBe4.com/SettingTheTrap
  • How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with D Recorded: Aug 23 2019 55 mins
    Roger Grimes
    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.

    What you’ll learn:
    - How to enable DMARC, SPF, and DKIM
    - Common configuration mistakes
    - How to best configure DMARC and other defenses to fight phishing
    - Techniques to empower your users to identify and avoid phishing attempts that make it through your surface-level defense
  • 2019 Phishing Attack Landscape and Benchmarking Recorded: Aug 5 2019 61 mins
    Perry Carpenter
    As a security leader, you’re faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up!

    IT security seems to be a race between effective technology and clever attack methods. However, there’s an often overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

    Join Perry Carpenter, for a review of the 2019 Phishing Industry Benchmarking Study, a data set of nearly nine million users across 18,000 organizations with over 20 million simulated phishing security tests.

    In this on-demand webinar, research from KnowBe4 highlights employee Phish-prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks. Taking it a step further, the research also reveals radical drops in careless clicking after 90 days and 12 months of new-school security awareness training.

    Do you know how your organization compares to your peers of similar size?

    Watch it now!
  • Ransomware Hostage Rescue Manual Recorded: Aug 5 2019 55 mins
    Erich Kron, David Littman
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • Top 5 IT Security Myths Your CISO Believes Are True...BUSTED! Recorded: Aug 1 2019 59 mins
    Roger Grimes, Erich Kron
    Roger Grimes and Erich Kron will help you decide how to invest your time and money wisely, how to implement worthwhile defenses, and what holes to plug so your organization gets the best bang for your security budget buck. Join them to uncover the truth behind the Top 5 IT Security Myths.
  • 10 Incredible Ways You Can Be Hacked Through Email Recorded: Aug 1 2019 61 mins
    Roger Grimes, David Littman
    Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer, Kevin Mitnick.
  • Spiceworks On the Air: Fake News! How Hackers Are Using Headlines As Phish-Bait Recorded: Jul 25 2019 65 mins
    Erich Kron, Justin Ong, Angie Mongtomery
    Extra Extra! Read all about it! Your users are far more likely to click on phish-bait when it references current events and other headlines they may be reading from other sources. So how can organizations stay ahead of this startling trend and keep their users in the know?

    On this episode of On the Air, we’ll be talking about exactly how and in what ways bad guys are successfully turning real news stories into clickbait, and what you should be doing about it. We’ll be talking with an IT pro from the Spiceworks Community as well as an expert from KnowBe4.

    Here’s what we’ll discuss:

    - Which types of news stories are more irresistible to your users than others
    - Keeping your training up to date and teaching your users how to spot fake news headlines
    - How to utilize these techniques in your own phish testing
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network Recorded: Jul 22 2019 61 mins
    Roger Grimes
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the “Cyber Kill Chain” in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:
    How detailed data is harvested using public databases and surprising techniques
    Tricks used to craft a compelling social engineering attack that your users WILL click
    Cunning ways hackers deliver malicious code to take control of an endpoint
    Taking over your domain controller and subsequently your entire network
    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use Recorded: Jun 28 2019 70 mins
    Kevin Mitnick, Perry Carpenter
    Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows.

    The truth is that it is shockingly easy to gather detailed intelligence on individuals and organizations. Everything the bad guys need to specifically target your end users is out there for the taking. Banking and credit card accounts, driver's license numbers, geolocation details and even IT secrets can be found easily and through public resources! There’s even a name for it: Open Source Intelligence (OSINT).

    In this mind-blowing webinar, Kevin and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, give you an inside look into some of Kevin’s most prized, underground OSINT secrets and how the bad guys use those techniques to target your users and your organizations.

    Find out what to watch out for and learn how to strengthen your end-user “human firewall” against OSINT-fueled attacks before it's too late!
  • Security Awareness: Securing the Human Layer Recorded: Jun 28 2019 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Jun 28 2019 68 mins
    Roger Grimes
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Your Ultimate Guide to Phishing Mitigation Recorded: Jun 28 2019 62 mins
    Roger Grimes
    Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait.

    This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, covers a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We didn't just cover one angle. We’ll came at it from all angles!

    Join Roger as he dives deep to teach you how to develop a comprehensive, defense-in-depth plan, introduces technical controls all organizations should consider, covers the benefits of new-school security awareness training, and goes over the best practices for creating and implementing security policies, all while staying phish-free!
  • Security Awareness: Securing the Human Layer Recorded: Jun 14 2019 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Jun 14 2019 68 mins
    Roger Grimes
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Hacking Data Sources That Bad Guys Use, Revealed by Kevin Mitnick Recorded: May 31 2019 3 mins
    Perry Carpenter
    Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows. And he'll share those secrets with you on this upcoming webinar. Register at: https://event.on24.com/wcc/r/1987306/120DACBD77DBFB3669AC398388105E40?partnerref=BrightTALK
  • 12 Ways to Defeat Multi-Factor Authentication Recorded: May 24 2019 62 mins
    Roger Grimes
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution.

    The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Would You Take the Bait? Top Phishing Email Subjects Users Are Clicking On Recorded: May 8 2019 47 mins
    Erich Kron, Mitchell Milligan, Justin Ong
    The greatest risk to the security of your company isn’t just hackers. It’s the users who let the bad guys get access to your network without even knowing it! Creating a security awareness training program that really works means training and phishing your users with real-world scenarios. You have to start phishing like the bad guys!

    In this Spiceworks Video Meetup we discuss KnowBe4’s most recent phishing benchmark report to see how you stack up across your industry, the latest trends in phish scams, and the power of effective new-school security awareness training.

    Here’s what we discuss:
    - Top email and social media topics to test your users on, and how to phish like the bad guys
    - Looking at phishing vulnerability by industry
    - How to develop and re-assess your security awareness training strategy to ensure your users create a human firewall
  • What Keeps IT Pros Like You Up At Night Recorded: Apr 24 2019 63 mins
    Nick Cavalancia, Erich Kron
    When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. The problem is that cybercriminals are constantly evolving their tradecraft, becoming more daring, sophisticated, and successful at cyberattacks and making it increasingly difficult for IT to keep the bad guys out. 

    With so many possible issues for you to address, what do other IT pros like you really have a handle on and what’s keeping them lying awake at night?

    In this informative webcast, cybersecurity expert and Microsoft MVP, Nick Cavalancia, and Erich Kron, KnowBe4's Security Awareness Advocate, as they discuss the results of KnowBe4’s 2019 What Keeps You Up At Night Report.

    Topics include:
    - Attack Types
    - Security Initiatives
    - Compliance vs. Security
    - User-Related Issues
    - Resource Issues
    - Executive-Level Concerns
  • 12 Ways to Defeat Multi-Factor Authentication Recorded: Apr 22 2019 62 mins
    Roger Grimes
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 12 ways hackers can and do get around your favorite MFA solution.

    The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Human Firewalls: Fact or Fiction Recorded: Apr 10 2019 112 mins
    Erich Kron, Mitch Parker, Dominick Frazier
    Looking at the current cyber attacks it's clear that ransomware, phishing, CEO Fraud / W-2 scams are on the rise costing organizations billions of dollars in 2018 alone. It got us thinking what security measures are actually effective with this ever-changing threat landscape? Are technological defenses enough? Is it really necessary or feasible for you to train and test users to the point of becoming a human firewall? Is a human firewall even helpful if antivirus, firewalls, email security, etc. are already in place?

    Join our team of experts as we discuss the advantages and disadvantages of a technology-only approach and whether end users can actually be trained to the point of reducing organizational risk. Learn the facts, so you can decide how best to invest your time and money to make sure your organization gets the best bang out of your security budget buck.
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: End of Year - The Perfect Storm for Phishing Attacks
  • Live at: Dec 10 2018 2:15 pm
  • Presented by: Erich Kron, Michael Osterman, David Littman
  • From:
Your email has been sent.
or close