Hi [[ session.user.profile.firstName ]]

An Inside View Into the Methods & Exploits of Kevin Mitnick

Many of the world's most reputable organizations rely on Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, to uncover their most dangerous security flaws. Kevin’s experience as a security consultant and his vast knowledge of social engineering are part of what help you train your users to stay a step ahead of the bad guys.

Wouldn’t it be great if you had insight into the latest threats and could find out “What would Kevin do”? Now you can!

In this webinar you will:

- Watch an exclusive demo of a shocking Outlook Exchange exploit
- Find out how these vulnerabilities may affect your organization
- Learn what you can do to stop the bad guys (What Would Kevin Do)
Recorded Mar 14 2019 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Mitnick, Perry Carpenter
Presentation preview: An Inside View Into the Methods & Exploits of Kevin Mitnick

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox Recorded: Oct 11 2019 60 mins
    Roger Grimes, Justin Ong
    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.

    In this special National Cybersecurity Awareness Month edition of On The Air, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and an IT pro from the Spiceworks community will discuss how to enable DMARC, SPF, DKIM the right way! Learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses and enable your human firewall.

    Here’s what we’ll discuss:


    How to enable DMARC, SPF, and DKIM

    Common configuration mistakes

    How to best configure DMARC and other defenses to fight phishing

    Techniques to empower your users to identify and avoid phishing attempts that make it through your surface-level defense
  • End User Training: The Most Effective Security Antidote for Social Engineering Recorded: Oct 1 2019 6 mins
    Stu Sjouwerman, Terry Sweeney
    In this interview with Stu Sjouwerman, Founder and CEO of KnowBe4, during the 2019 Black Hat conference in Las Vegas, he discusses with DarkReading why regularly phishing your users is hands-down the best way to keep your organization safe from the bad guys.

    Social engineering remains the top vulnerability organizations face because humans remain the easiest way to access networks or databases, says Sjouwerman. Regular training sessions coupled with creation of a "human firewall" remain the most effective protections against social engineering and phishing. Your users are your last defense against these attacks! Keep them on their toes with real-world, new-school security awareness training.
  • In the Hot Seat: Three Experts Tackle 10 Critical Security Awareness Issues Recorded: Sep 27 2019 60 mins
    Perry Carpenter, Jinan Budge, Claire O'Malley
    Three experts. 10 hot topics. Sixty minutes. What happens when you lock highly opinionated security awareness experts in a room with a microphone and a list of top security issues facing your organization? This is your chance to find out!

    In this webinar, Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, and, our guests, Forrester’s Jinan Budge and Claire O’Malley provide practical advice and pithy comments as they take on a wide-ranging list of security awareness topics, behavior, and culture management issues in rapid-fire format.

    Key topics include:

    The real cost of ignoring the human element

    What can security awareness mean for your organization’s overall reputation?

    Talking to your execs and the board about cybersecurity

    How do you measure the benefit of awareness, behavior and culture change?

    Security awareness & training content: Quality versus quantity

    And many others!

    Get the expert take! Find out how to empower your end users, measure success and help keep the bad guys out. Watch now!
  • 2019 Phishing Attack Landscape and Benchmarking Recorded: Sep 24 2019 61 mins
    Perry Carpenter
    As a security leader, you’re faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up!

    IT security seems to be a race between effective technology and clever attack methods. However, there’s an often overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

    Join Perry Carpenter, for a review of the 2019 Phishing Industry Benchmarking Study, a data set of nearly nine million users across 18,000 organizations with over 20 million simulated phishing security tests.

    In this on-demand webinar, research from KnowBe4 highlights employee Phish-prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks. Taking it a step further, the research also reveals radical drops in careless clicking after 90 days and 12 months of new-school security awareness training.

    Do you know how your organization compares to your peers of similar size?

    Watch it now!
  • Tales from the Trenches: Security Awareness Training in the Real World Recorded: Sep 24 2019 60 mins
    Erich Kron, Tory Dombrowski, Justin Ong
    Let's be real, training your users against the bad guys' new, tempting, click-bait style content isn’t always successful when you rely on “industry best practices” alone. In fact, about 30% of untrained users will fall for a targeted phishing attack!

    But it doesn’t have to be that way. You can implement security awareness training that teaches your users how to truly be mindful in the real world, not just in corporate training. But how? Let other Spiceheads tell you!

    On this Video Meetup with Spiceworks we sit down with an IT Pro from the Spiceworks Community to hear about their experiences and lessons learned when training their users to spot the newest and most emotionally compelling phishing email, as well as Erich Kron from KnowBe4. He chimes in on all-things social engineering and how you can leverage KnowBe4's trainings and resources to help solidify your human firewall.

    We discuss:


    Why it's so important to empower your users to become a "human firewall"

    What it's really like to get executive buy-in and implement security awareness training and simulated phishing

    The good, the bad and the truly hilarious results of training and testing your users
  • Setting the Trap: Crafty Ways the Bad Guys Use Pretexting to Own Your Network fe Recorded: Sep 24 2019 62 mins
    Kevin Mitnick, Perry Carpenter
    Today’s phishing attacks have evolved way beyond spray-and-pray emails that mass target victims. Instead, the bad guys have carefully researched your organization in order to set the perfect trap. And pretexting is the key.

    Whether it’s a phone call from an attacker impersonating your IT department or what seems like an innocuous email that ends up harvesting important credentials, the perfect pretext can lead to the bad guys owning your network before you know it.

    In this webinar Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, show how the bad guys craft such cunning attacks. They dig into tactics for reconnaissance, target selection, creating a pretext, and launching an attack. And more importantly, they tell you what you need to know to protect your organization.

    Kevin also shares new demonstration videos that will blow your mind! This is one webinar you can't afford to miss! Watch now!
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Sep 17 2019 68 mins
    Roger Grimes
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Deepfakes: A World of New Social Engineering Realities Recorded: Sep 17 2019 35 mins
    Dr. Lydia Kostopoulos
    With each day deepfakes become more convincing, accessible and easier to create and distribute. In parallel to this, other emerging technologies are developing such as augmented reality and virtual reality. This talk highlights some of the challenges we will face with sophisticated deepfakes.
  • How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with D Recorded: Aug 23 2019 55 mins
    Roger Grimes
    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.

    What you’ll learn:
    - How to enable DMARC, SPF, and DKIM
    - Common configuration mistakes
    - How to best configure DMARC and other defenses to fight phishing
    - Techniques to empower your users to identify and avoid phishing attempts that make it through your surface-level defense
  • 2019 Phishing Attack Landscape and Benchmarking Recorded: Aug 5 2019 61 mins
    Perry Carpenter
    As a security leader, you’re faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up!

    IT security seems to be a race between effective technology and clever attack methods. However, there’s an often overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

    Join Perry Carpenter, for a review of the 2019 Phishing Industry Benchmarking Study, a data set of nearly nine million users across 18,000 organizations with over 20 million simulated phishing security tests.

    In this on-demand webinar, research from KnowBe4 highlights employee Phish-prone™ percentages by industry, revealing at-risk users that are susceptible to phishing or social engineering attacks. Taking it a step further, the research also reveals radical drops in careless clicking after 90 days and 12 months of new-school security awareness training.

    Do you know how your organization compares to your peers of similar size?

    Watch it now!
  • Ransomware Hostage Rescue Manual Recorded: Aug 5 2019 55 mins
    Erich Kron, David Littman
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • Top 5 IT Security Myths Your CISO Believes Are True...BUSTED! Recorded: Aug 1 2019 59 mins
    Roger Grimes, Erich Kron
    Roger Grimes and Erich Kron will help you decide how to invest your time and money wisely, how to implement worthwhile defenses, and what holes to plug so your organization gets the best bang for your security budget buck. Join them to uncover the truth behind the Top 5 IT Security Myths.
  • 10 Incredible Ways You Can Be Hacked Through Email Recorded: Aug 1 2019 61 mins
    Roger Grimes, David Littman
    Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer, Kevin Mitnick.
  • Spiceworks On the Air: Fake News! How Hackers Are Using Headlines As Phish-Bait Recorded: Jul 25 2019 65 mins
    Erich Kron, Justin Ong, Angie Mongtomery
    Extra Extra! Read all about it! Your users are far more likely to click on phish-bait when it references current events and other headlines they may be reading from other sources. So how can organizations stay ahead of this startling trend and keep their users in the know?

    On this episode of On the Air, we’ll be talking about exactly how and in what ways bad guys are successfully turning real news stories into clickbait, and what you should be doing about it. We’ll be talking with an IT pro from the Spiceworks Community as well as an expert from KnowBe4.

    Here’s what we’ll discuss:

    - Which types of news stories are more irresistible to your users than others
    - Keeping your training up to date and teaching your users how to spot fake news headlines
    - How to utilize these techniques in your own phish testing
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network Recorded: Jul 22 2019 61 mins
    Roger Grimes
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the “Cyber Kill Chain” in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:
    How detailed data is harvested using public databases and surprising techniques
    Tricks used to craft a compelling social engineering attack that your users WILL click
    Cunning ways hackers deliver malicious code to take control of an endpoint
    Taking over your domain controller and subsequently your entire network
    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use Recorded: Jun 28 2019 70 mins
    Kevin Mitnick, Perry Carpenter
    Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows.

    The truth is that it is shockingly easy to gather detailed intelligence on individuals and organizations. Everything the bad guys need to specifically target your end users is out there for the taking. Banking and credit card accounts, driver's license numbers, geolocation details and even IT secrets can be found easily and through public resources! There’s even a name for it: Open Source Intelligence (OSINT).

    In this mind-blowing webinar, Kevin and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, give you an inside look into some of Kevin’s most prized, underground OSINT secrets and how the bad guys use those techniques to target your users and your organizations.

    Find out what to watch out for and learn how to strengthen your end-user “human firewall” against OSINT-fueled attacks before it's too late!
  • Security Awareness: Securing the Human Layer Recorded: Jun 28 2019 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Jun 28 2019 68 mins
    Roger Grimes
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Your Ultimate Guide to Phishing Mitigation Recorded: Jun 28 2019 62 mins
    Roger Grimes
    Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait.

    This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, covers a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We didn't just cover one angle. We’ll came at it from all angles!

    Join Roger as he dives deep to teach you how to develop a comprehensive, defense-in-depth plan, introduces technical controls all organizations should consider, covers the benefits of new-school security awareness training, and goes over the best practices for creating and implementing security policies, all while staying phish-free!
  • Security Awareness: Securing the Human Layer Recorded: Jun 14 2019 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: An Inside View Into the Methods & Exploits of Kevin Mitnick
  • Live at: Mar 14 2019 6:00 pm
  • Presented by: Kevin Mitnick, Perry Carpenter
  • From:
Your email has been sent.
or close