Hi [[ session.user.profile.firstName ]]

A Former CIA Threat Analyst Shows How to Make Your Organization a Hard Target

Having spent over a decade as part of the CIA’s Center for Cyber Intelligence and the Counterterrorism Mission Center, Rosa Smothers knows the ins and outs of leading cyber operations against terrorists and nation-state adversaries. She has seen first-hand how the bad guys operate, she knows the threat they pose, and she can tell you how to use that knowledge to make organizations like yours a “hard target”.

In this exclusive webinar, we find out why Rosa, now KnowBe4’s SVP of Cyber Operations, encourages organizations like yours to maintain a healthy sense of paranoia as she and Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, walk you through the murky underworld of threats and exploits that your organization can't afford to ignore.

Get the inside (spy-)scoop on:

- Surprising data collection techniques – both physical and cyber
- The two easiest ways to break into any existing network
- Hidden threats of social media connections
- And how to prepare your end users to defend against them all
Recorded Nov 1 2019 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rosa Smothers, Perry Carpenter
Presentation preview: A Former CIA Threat Analyst Shows How to Make Your Organization a Hard Target

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Ransomware Hostage Rescue Manual Recorded: Dec 6 2019 55 mins
    Erich Kron, David Littman
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • A Former CIA Threat Analyst Shares Security Practices You Should Be Implementing Recorded: Dec 5 2019 59 mins
    Rosa Smothers. Justin Ong, Juan Hernandez
    Having spent over a decade as part of the CIA’s Center for Cyber Intelligence and the Counterterrorism Mission Center, Rosa Smothers knows the ins and outs of leading cyber operations against terrorists and nation-state adversaries. She has seen first-hand how the bad guys operate, she knows the threat they pose, and she can tell you how to use that knowledge to harden your organization’s defense.

    In this exclusive webinar, we’ll find out why Rosa, now KnowBe4’s SVP of Cyber Operations, encourages organizations like yours to maintain a healthy sense of paranoia as she walks you through the murky underworld of threats and exploits that your organization can't afford to ignore. We’ll also be joined by an IT pro from the Spiceworks Community.

    Here’s what we’ll discuss:

    - Understanding physical security risks like tailgating and badge impersonation, and the tactics secure organizations use to prevent this
    - Surprising data collection techniques – both physical and cyber
    - The pros (and cons) of MFA and why your company needs to take password security seriously
    - How you can educate and prepare your end users to defend against them all
  • Levers of Human Deception Recorded: Dec 5 2019 52 mins
    Erich Kron, David Littman
    No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

    Join Erich Kron, Security Awareness Advocate at KnowBe4 and David Littman from TruthInIT, as they provide fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, We'll look at how to ethically use the very same levers when educating our users.

    Key Takeaways:
    - The Perception Vs. Reality Dilemma
    - Understanding the OODA (Observe, Orient, Decide, Act) Loop
    - How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
    - How we can defend ourselves and our organizations
  • Top Security Trends in Europe Recorded: Dec 4 2019 21 mins
    Javvad Malik, Jelle Wieringa
    Defending your organization against cyber threats is not a one-size-fits-all approach. Cultural differences, language barriers, regional policies and more can mean that what is happening (and working) in North America in the IT security space may not necessarily fit the bill in other parts of the world.

    In this discussion, Javvad Malik and Jelle Wieringa, European-based Security Awareness Advocates for KnowBe4, share their insights on current and future cybersecurity trends across Europe that your organization needs to know about.

    They discuss:

    - The far-reaching implications of GDPR
    - What SOCs need to be doing differently in Europe compared to their North American counterparts
    - The evolution of security awareness in Europe
    - Emerging threats and applications of deepfake technology
    - What the future may hold and how Europe is leading the world in privacy

    Join Javvad and Jelle as they tackle how you and your organization can better prepare and defend against these ever-changing threats.
  • Third-Party Phishing: The Phishing Attacks That Traditional Defenses Don't Stop Recorded: Dec 3 2019 55 mins
    Erich Kron
    Because third-party phishing attacks look like legitimate emails from your vendors’ domains, traditional defenses often don't work against them or they are severely weakened. Your only defense is a strong human firewall. Find out how third-party phishing attacks operate, how you can spot them, and learn what defenses do and don't work against them.

    Join Erich Kron, Security Defense Evangelist at KnowBe4, to see:

    - Real-world examples of third-party phishing schemes
    - Hacking techniques that make these targeted attacks even more dangerous
    - How to protect your network against these aggressive schemes
    - What to teach your end users so they can identify a third-party attack
  • Lower Your Business Risk with Best Practice Data Privacy Impact Assessments Recorded: Dec 3 2019 45 mins
    Lecio DePaula Jr.
    Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from Marriott’s acquisition of Starwood, not undergoing a full security and privacy assessment can present huge problems for your organization and now Marriott faces a $123.6 million dollar fine due to lack of due diligence.

    One way to reduce risks and identify security/privacy risk is to conduct a data protection impact assessment. Not only will this assessment help you reduce business risk, but it also helps identify new processes in your organization to maintain compliance with GDPR, LGPD, CCPA and other global privacy laws.

    Join Lecio DePaula Jr., KnowBe4’s Data Privacy Director, for this webinar to hear about creating a robust data protection impact assessment to analyze new processes, workflows, and products to identify problems before they happen.

    In this webinar you’ll learn:

    - Best practices for conducting a robust DPIA
    - The privacy and security risks of M&A, creating new software products, other initiatives
    - How conducting a DPIA aligns with global privacy requirements
    - Common DPIA mistakes and how to avoid them
    - Tools that help manage and streamline your DPIA process
  • Your Ultimate Guide to Phishing Mitigation Recorded: Nov 21 2019 61 mins
    Roger Grimes, David Littman
    Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait.

    This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, covers a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We didn't just cover one angle. We’ll came at it from all angles!

    Join Roger as he dives deep to teach you how to develop a comprehensive, defense-in-depth plan, introduces technical controls all organizations should consider, covers the benefits of new-school security awareness training, and goes over the best practices for creating and implementing security policies, all while staying phish-free!
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network Recorded: Nov 19 2019 60 mins
    Roger Grimes, David Littman
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:

    - How detailed data is harvested using public databases and surprising techniques
    - Tricks used to craft a compelling social engineering attack that your users WILL click
    - Cunning ways hackers deliver malicious code to take control of an endpoint
    - Taking over your domain controller and subsequently your entire network

    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • Security Awareness: Securing the Human Layer Recorded: Nov 13 2019 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • A Former CIA Threat Analyst Shows How to Make Your Organization a Hard Target Recorded: Nov 1 2019 62 mins
    Rosa Smothers, Perry Carpenter
    Having spent over a decade as part of the CIA’s Center for Cyber Intelligence and the Counterterrorism Mission Center, Rosa Smothers knows the ins and outs of leading cyber operations against terrorists and nation-state adversaries. She has seen first-hand how the bad guys operate, she knows the threat they pose, and she can tell you how to use that knowledge to make organizations like yours a “hard target”.

    In this exclusive webinar, we find out why Rosa, now KnowBe4’s SVP of Cyber Operations, encourages organizations like yours to maintain a healthy sense of paranoia as she and Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, walk you through the murky underworld of threats and exploits that your organization can't afford to ignore.

    Get the inside (spy-)scoop on:

    - Surprising data collection techniques – both physical and cyber
    - The two easiest ways to break into any existing network
    - Hidden threats of social media connections
    - And how to prepare your end users to defend against them all
  • Fake News and Deepfakes: Harmless Fun or the Future of Fraud? Recorded: Oct 18 2019 62 mins
    Erich Kron, Javvad Malik
    We have all seen them. Fake news articles that get passed off as legit sources. Misleading memes. Entertaining videos that swap people’s faces. But what if these deception techniques were used against you to gain access to your organization? What if you receive a phone call or see a video from someone who sounds or even looks like your CEO, but it’s not really them?

    Join KnowBe4 Security Awareness Advocates Erich Kron and Javvad Malik as they discuss the frightening advancement in digital deception techniques and the growing popularity of recent threats known as “Deepfakes”. Deepfake technology uses advancements in Artificial Intelligence (AI) and Machine Learning (ML) technology to create realistic videos and audio using free software and inexpensive hardware from home. By faking instructions from leadership, these videos and audio files can be used to take traditional phishing and vishing attacks to a whole new level!

    Join us to learn about:

    An overview and history of digital fakes
    The use of free photo and video technology to create convincing fakes
    Potential real-world uses cases
    Impact of successful fakes on organizations
    Security awareness and detection of digital fakes
    Defending against fakes
  • How to Prevent 81% of Phishing Attacks from Sailing into Your Inbox with DMARC Recorded: Oct 11 2019 60 mins
    Roger Grimes, Justin Ong
    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.

    In this special National Cybersecurity Awareness Month edition of Spiceworks' On The Air, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, discusses how to enable DMARC, SPF, DKIM the right way! Learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses and enable your human firewall.

    Here’s what we’ll discuss:


    How to enable DMARC, SPF, and DKIM

    Common configuration mistakes

    How to best configure DMARC and other defenses to fight phishing

    Techniques to empower your users to identify and avoid phishing attempts that make it through your surface-level defense
  • End User Training: The Most Effective Security Antidote for Social Engineering Recorded: Oct 1 2019 6 mins
    Stu Sjouwerman, Terry Sweeney
    In this interview with Stu Sjouwerman, Founder and CEO of KnowBe4, during the 2019 Black Hat conference in Las Vegas, he discusses with DarkReading why regularly phishing your users is hands-down the best way to keep your organization safe from the bad guys.

    Social engineering remains the top vulnerability organizations face because humans remain the easiest way to access networks or databases, says Sjouwerman. Regular training sessions coupled with creation of a "human firewall" remain the most effective protections against social engineering and phishing. Your users are your last defense against these attacks! Keep them on their toes with real-world, new-school security awareness training.
  • Tackling the Top 10 Critical Security Awareness Issues Recorded: Sep 27 2019 60 mins
    Perry Carpenter, Jinan Budge, Claire O'Malley
    Three experts. 10 hot topics. Sixty minutes. What happens when you lock highly opinionated security awareness experts in a room with a microphone and a list of top security issues facing your organization? This is your chance to find out!


    Join Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, and, our guests, Forrester’s Jinan Budge and Claire O’Malley as they provide practical advice and pithy comments as they take on a wide-ranging list of security awareness topics, behavior, and culture management issues in rapid-fire format.


    Key topics include:
    - The real cost of ignoring the human element
    - What can security awareness mean for your organization’s overall reputation?
    - Talking to your execs and the board about cybersecurity
    - How do you measure the benefit of awareness, behavior and culture change?
  • 2019 Phishing Attack Landscape and Benchmarking Recorded: Sep 24 2019 61 mins
    Perry Carpenter
    As a security leader, you’re faced with a tough choice. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up!

    IT security seems to be a race between effective technology and clever attack methods. However, there’s an often overlooked security layer that can significantly reduce your organization’s attack surface: New-school security awareness training.

    Join Perry Carpenter, for a review of the 2019 Phishing Industry Benchmarking Study, a data set of nearly nine million users across 18,000 organizations with over 20 million simulated phishing security tests.

    In this on-demand webinar, research from KnowBe4 highlights:

    - Employee Phish-prone™ percentages by industry
    - Revealing at-risk users that are susceptible to phishing or social engineering attacks.
    - Radical drops in careless clicking after 90 days and 12 months of new-school security awareness training

    Do you know how your organization compares to your peers of similar size?
  • Security Awareness Training for the Real World Recorded: Sep 24 2019 60 mins
    Erich Kron, Tory Dombrowski, Justin Ong
    Let's be real, training your users against the bad guys' new, tempting, click-bait style content isn’t always successful when you rely on “industry best practices” alone. In fact, about 30% of untrained users will fall for a targeted phishing attack!

    But it doesn’t have to be that way. You can implement security awareness training that teaches your users how to truly be mindful in the real world, not just in corporate training. But how? Let other Spiceheads tell you!

    In this Video Meetup with Spiceworks we sit down with an IT Pro from the Spiceworks Community to hear about their experiences and lessons learned when training their users to spot the newest and most emotionally compelling phishing email, as well as Erich Kron from KnowBe4. He chimes in on all-things social engineering and how you can leverage KnowBe4's trainings and resources to help solidify your human firewall.

    Erich Kron, Tory Dombrowski and Justin Ong will discuss:

    - Why it's so important to empower your users to become a "human firewall"
    - What it's really like to get executive buy-in and implement security awareness training and simulated phishing
    - The good, the bad and the truly hilarious results of training and testing your users
  • Setting the Trap: Crafty Ways the Bad Guys Use Pretexting to Own Your Network Recorded: Sep 24 2019 62 mins
    Kevin Mitnick, Perry Carpenter
    Today’s phishing attacks have evolved way beyond spray-and-pray emails that mass target victims. Instead, the bad guys have carefully researched your organization in order to set the perfect trap. And pretexting is the key.

    Whether it’s a phone call from an attacker impersonating your IT department or what seems like an innocuous email that ends up harvesting important credentials, the perfect pretext can lead to the bad guys owning your network before you know it.

    In this webinar Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer discuss:

    - How the bad guys craft such cunning attacks
    - Tactics used for reconnaissance, target selection, creating a pretext, and launching an attack
    - What you need to know to protect your organization

    Kevin also shares new demonstration videos that will blow your mind! This is one webinar you can't afford to miss! Watch now!
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Sep 17 2019 68 mins
    Roger Grimes
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Deepfakes: A World of New Social Engineering Realities Recorded: Sep 17 2019 35 mins
    Dr. Lydia Kostopoulos
    With each day deepfakes become more convincing, accessible and easier to create and distribute. In parallel to this, other emerging technologies are developing such as augmented reality and virtual reality. This talk highlights some of the challenges we will face with sophisticated deepfakes.
  • How to Prevent 81% of Phishing Attacks from Sailing Right into Your Inbox with D Recorded: Aug 23 2019 55 mins
    Roger Grimes
    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.

    What you’ll learn:
    - How to enable DMARC, SPF, and DKIM
    - Common configuration mistakes
    - How to best configure DMARC and other defenses to fight phishing
    - Techniques to empower your users to identify and avoid phishing attempts that make it through your surface-level defense
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Former CIA Threat Analyst Shows How to Make Your Organization a Hard Target
  • Live at: Nov 1 2019 8:30 pm
  • Presented by: Rosa Smothers, Perry Carpenter
  • From:
Your email has been sent.
or close