Hi [[ session.user.profile.firstName ]]

Lower Your Business Risk with Best Practice Data Privacy Impact Assessments

Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from Marriott’s acquisition of Starwood, not undergoing a full security and privacy assessment can present huge problems for your organization and now Marriott faces a $123.6 million dollar fine due to lack of due diligence.

One way to reduce risks and identify security/privacy risk is to conduct a data protection impact assessment. Not only will this assessment help you reduce business risk, but it also helps identify new processes in your organization to maintain compliance with GDPR, LGPD, CCPA and other global privacy laws.

Join Lecio DePaula Jr., KnowBe4’s Data Privacy Director, for this webinar to hear about creating a robust data protection impact assessment to analyze new processes, workflows, and products to identify problems before they happen.

In this webinar you’ll learn:

- Best practices for conducting a robust DPIA
- The privacy and security risks of M&A, creating new software products, other initiatives
- How conducting a DPIA aligns with global privacy requirements
- Common DPIA mistakes and how to avoid them
- Tools that help manage and streamline your DPIA process
Recorded Jun 1 2020 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Lecio DePaula Jr.
Presentation preview: Lower Your Business Risk with Best Practice Data Privacy Impact Assessments

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Oct 26 2020 68 mins
    Roger Grimes
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as he joins for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • The Many Ways to Hack Multi-Factor Authentication Recorded: Oct 21 2020 62 mins
    Roger Grimes
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, a security expert with over 30-years experience, and David Littman of TruthInIT for this video webinar where they will explore 12 ways hackers can and do get around your favorite MFA solution.

    The on-demand webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Open Sesame! And Other Passwords Challenges Recorded: Oct 21 2020 52 mins
    Roger Grimes (KnowBe4), Tom Bechtold (SecureWorld)
    The password has been around a LONG time. It’ll probably always live on in some form. For InfoSec professionals it is a source of contention. Companies already have enough to worry about with the day in and day out business. Getting hacked because your employees utilize weak passwords isn’t part of the plan.

    In this session we are going to have a candid discussion with Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, on:

    - What challenges lay beyond weak passwords
    - Unpack browser password hacking
    - Breached passwords (think PasteBin)
    - Multi-Factor Authentication

    And a few others that will likely surprise you!
  • Critical Considerations When Choosing Your Security Awareness Vendor Recorded: Oct 20 2020 58 mins
    Perry Carpenter
    It’s become more and more evident to organizations that new-school security awareness training is an absolute requirement for managing the ongoing problem of social engineering. But how do you develop a program that will deliver the goods without doubling your workload or costing an arm and a leg?

    In this on-demand webinar Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer and former Gartner Analyst, steps you through key measures that will help you make an informed security awareness decision for your organization.

    You’ll gain insight into:

    - Critical components to make your program successful from the start
    - Features to look for that will ease implementation and ongoing management
    - How to create a process to demonstrate measurable success

    Find out now how you can not only check the box on security awareness training, but develop sustainable, meaningful change in your organization's security posture.
  • The Pesky Password Problem: Policies That Help You Gain the Upper Hand Recorded: Oct 20 2020 63 mins
    Roger Grimes
    What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?

    For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries’ inability to engineer secure systems. Password complexity, length, and rotation requirements are the bane of your end-user experience and literally the cause of thousands of data breaches. But it doesn't have to be that way!

    Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, to find out what your password policy should be and learn about the common mistakes organizations make when creating password policy.

    In this webinar you'll learn:

    - Why passwords are so easy to hack and how the bad guys do it
    - How to craft a secure, risk-focused password security policy
    - The truth about password managers and multi-factor authentication and how they impact your risk
    - How to empower your end users to become your best last line of defense
  • One Size Does Not Fit All: Reshaping SAT Programming to Change Behavior Recorded: Oct 15 2020 38 mins
    Joanna Huisman
    When designing and implementing employee cybersecurity awareness programs, how do you take the complexity of human behavior into account? Current best practices go beyond PowerPoint & include collaborative, creative, and data-driven approaches that actually change behavior. Experts will share emerging trends and innovative approaches to designing effective enterprise security awareness programs.
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network Recorded: Oct 9 2020 61 mins
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the “Cyber Kill Chain” in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:
    - How detailed data is harvested using public databases and surprising techniques
    - Tricks used to craft a compelling social engineering attack that your users WILL click
    - Cunning ways hackers deliver malicious code to take control of an endpoint
    - Taking over your domain controller and subsequently your entire network

    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • The Critical Need to Improve Your Compliance Processes Recorded: Oct 2 2020 59 mins
    Erich Kron
    You know that compliance is an important requirement but can also be time-consuming and fraught with risk. Still, most organizations have not implemented the processes and tools necessary to manage the compliance process efficiently. The often-tedious processes related to compliance don’t have to be a burden or a risk. Your security and compliance can be aligned and made more efficient by reducing or eliminating redundant steps and using the right tools.

    Join Erich Kron, Technical Evangelist at KnowBe4, to learn how you can streamline your processes to effectively demonstrate compliance and save so much time.

    In this webinar we will discuss:

    - Common challenges organizations face regarding compliance
    - The dangerous impact non-compliance can have on your organization
    - Differences between organizational and departmental compliance
    - Find out how to streamline your audit processes, assign tasks, and organize evidence in a way that will save you tons of time.
  • Your Organization Through the Eyes of an Attacker Recorded: Oct 2 2020 57 mins
    Roger Grimes
    The bad guys are out there, watching and waiting for an opportunity to strike. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses.

    What if you could see your organization through the eyes of an attacker? We'll give you insights into their motivations and how you can use that information to your advantage. Plus, we’ll show simple strategies you can implement to make your organization a harder target.

    Join Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, as he dives into the mind of a hacker to help you better understand your risks, and what you can do today to improve your defenses right now.

    In this session you’ll learn:

    - Why hackers are targeting your organization    
    - Three key questions you need to be able to answer about your network security
    - The common mistakes your organization can make when building your defenses
    - How your end users can help you can defend against ever-evolving threats

    Get the details you need to know now!
  • Insights from Former CIA Analysts: Spotting Fake News to Protect Your Org Recorded: Oct 2 2020 61 mins
    Perry Carpenter, Rosa Smothers, Cindy Otis
    Fake news and disinformation have become an unfortunate part of our everyday lives. And the bad guys are using it to influence you and affect your organization. To help you interpret the barrage of confusing and oftentimes conflicting information, we have turned to the experts including former CIA Analysts, Rosa Smothers and Cindy Otis.

    Join Perry Carpenter, Chief Evangelist and Strategy Office at KnowBe4, along with Rosa, now KnowBe4’s SVP of Cyber Operations and Cindy, author of True or False: A CIA Analyst’s Guide to Identifying and Fighting Fake News, as they take on all things fake news.

    In this webinar you'll learn:
    - The different kinds of disinformation that bad actors use to trick you
    - How nation states use fake news to infiltrate your organization
    - Why disinformation is so dangerous
    - How to spot and avoid disinformation campaigns
    - Ways you can train your users to spot disinformation and keep your organization safe
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: Sep 28 2020 73 mins
    Roger Grimes (KnowBe4), Gary Miliefsky (Cyber Defense Media Group)
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as he joins Cyber Defense Media Group's Gary Miliefsky for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Your Ransomware Task Force: Critical Steps for Responding to a Ransomware Attack Recorded: Sep 25 2020 61 mins
    Roger Grimes (KnowBe4), John Mullen (Mullen Coughlin)
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    To help you prepare for a rapid response Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, interviewed John Mullen, of Mullen Coughlin LLC, who is a seasoned, hands-on ransomware and data loss professional. John has served as a “Breach Coach” to thousands of affected organizations to help them contain and investigate ransomware attacks.

    In this session you’ll learn:

    - The number one mistake most ransomware victims are making today
    - When you need to call a “Breach Coach” and what they can do to help
    - Rapid response steps you need to take when your organization gets hit
    - Why new-school security awareness training is more critical than ever before
  • Your Ransomware Task Force: Extortion, Crisis Management and Recovery Recorded: Sep 25 2020 59 mins
    Roger Grimes (KnowBe4), Bill Hardin (Charles River Associates)
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    Watch this on-demand webinar where Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, interviews Bill Hardin of Charles Rivers Associates for an exclusive webinar, Ransomware Expert Guide: Extortion, Crisis Management, and Recovery. Roger and Bill take a deep dive into ransomware forensics and recovery to help you prepare for a rapid response before a ransomware attack affects your organization.

    In this session you’ll learn:

    - Of the thousands of cyber events Bill has investigated what is different in 2020
    - Tactics and techniques your security team can use to hunt within your environment
    - Bill’s top 3 takeaways regarding ransomware recovery
    - How to enable your users to spot suspicious attacks before they affect you
  • Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain Recorded: Sep 24 2020 59 mins
    James McQuiggan
    Your customer data, intellectual property, and financials are the lifeblood of your organization. If lost or leaked, there could be significant implications to the viability of your business. Maintaining control of that data, especially with third-party services, can be extremely challenging and requires that you ask the right questions and enforce stringent security policies.

    In an environment of increased outsourcing, cloud computing adoption, and regulatory requirements, how do you manage vendor risk and ensure you have a consistent evaluation life cycle

    Join James McQuiggan, KnowBe4's Security Awareness Advocate, to get actionable steps you can use now to better manage your third-party vendor risk. You'll learn:

    The importance of securing your organization's critical data
    How to determine Supplier Security Proficiency
    Why it’s important to understand the source of third-party products
    The impact Vendor Questionnaires have on your Security Posture
    How leveraging a GRC platform can ease the burden of risk assessments and audits
  • Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate Links Recorded: Sep 23 2020 61 mins
    Roger Grimes
    Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your users into clicking and putting your network at risk. You need to stay a step ahead of the bad guys.

    Join us for this webinar when Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, shows you how to become a rogue URL expert.

    He’ll dive deep into the latest techniques and defenses to share:

    - Real-life examples of advanced attacks using rogue digital certificates, homograph attacks, and more
    - Safe forensic methods for examining URLs and other tactics for investigating phishy emails
    - Strategies for dissecting URLs on mobile without clicking
    - Simple ways you can train your users to scrutinize URLs and keep your network safe
  • Think Like a Hacker: Learn How to Use OSINT to Defend Your Organization Recorded: Sep 22 2020 57 mins
    Rosa Smothers, SVP of Cyber Operations at KnowBe4
    In today's digital age we are surrounded by massive amounts of data every day. This makes it ridiculously easy to gather shockingly detailed information about anyone… even your organization. Bad actors use open source intelligence (OSINT) techniques to gather this inside knowledge and create attacks your users will click on. No one knows this better than former CIA Cyber Threat Analyst and Technical Intelligence Officer, Rosa Smothers. But she can show you how to use OSINT to turn the tables on the bad guys and regain the upper hand.

    Join us as Rosa, now KnowBe4's SVP of Cyber Operations shares her insights on how to leverage OSINT to defend your organization and think like a hacker!

    Rosa will show you:

    How to go beyond general OSINT techniques to gather the details you need for effective investigations

    Apps and analytic techniques that enhance your research and data interpretation

    Live demonstrations of OSINT gathering techniques you can use before the bad guys do

    How training your users to understand OSINT and their digital footprint can protect your organization from threat actors

    Learn how to use hackers' best techniques against them!
  • You've Got Humans on Your Network! Recorded: Sep 22 2020 71 mins
    Joanna Huisman (KnowBe4), Dr. Christopher Pierson (BlackCloak), Trip Hillman (Weaver), Tom Bechtold (SecureWorld)
    They are all over your network doing all sorts of things with company data. Most of them are doing exactly what they are supposed to be doing. Nothing new to report there but do you know who they all are? Should they have that level of access? Why is Carol in accounting downloading 1 TB of data? Did John in sales just send the competitors a price list? When is the last time you REALLY did some security awareness training besides that one video you sent 6 months ago?

    Now people are working from home. Who is using this corporate device? Where did this Chromebook come from on the network?

    We have a lot of questions and a lot of work ahead of us as it relates to the human element and Information Security. Some say there is are technical controls we need to put in place. Some say it is merely adopting a company culture shift toward security. The truth is probably somewhere in the middle. Bring our panelists your questions and let’s help our end-users!
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim Recorded: Sep 22 2020 103 mins
    Roger Grimes (KnowBe4), Sam Masiello (Gates Corporation), Tom Bechtold (SecureWorld)
    Join Roger Grimes, SecureWorld's Tom Bechtold, and Gates Corporation CISO Sam Masiello as they discuss the ever changing (and scary) world of ransomware.

    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

    They dive into:

    Why data backups (even offline backups) won’t save you
    Evolved threats from data-theft, credential leaks, and corporate impersonation
    Why ransomware isn’t your real problem
    How your end users can become your best, last line of
    defense
  • Why the Human Factor is Still the Most Important Part of IT Security Recorded: Sep 21 2020 61 mins
    Rosa Smothers (KnowBe4), Teri Takai (Center for Digital Government)
    Smart network security involves a mix of hardware and software solutions designed to safeguard your data. But there’s another key security factor that’s just as vital, and it’s one that’s frequently neglected by technologists: the human element. Understanding the human risk factor and the role it plays in creating network vulnerabilities is vital to ensuring that your systems and your data are safely protected.

    And it’s never been more important for state and local tech leaders to get it right. The shutdowns and economic turmoil of the coronavirus pandemic have created a new world that’s ripe for hackers and scammers.
    Ransomware and malware attacks are up, and users working from home are more susceptible to phishing attempts and other attempts to gain access to your network. If you’re not focusing on the human element, you’re ignoring a crucial part of your overall security program.

    In this one-hour webinar, a panel of experts and thought leaders will discuss important topics including:

    - Why your users are your most important line of defense, and how you can build and empower your “human firewall”
    - How Covid-19 has reshaped the threat landscape, and how that will be affected by the economic crisis
    - What you can do now to make your organization a hard target for bad actors
    - How security awareness training can enable your employees to make smarter security decisions every day
  • It All Started with a Phish... Recorded: Sep 16 2020 60 mins
    Roger Grimes (Data-Driven Defense Evangelist, KnowBe4), David Bayer (VP Program Management & Product Marketing, Vailmail)
    We all have come to understand that most of the successful breaches started with a phishing attack. Through use of technologies such as DMARC, DKIM, SPF, MFA, and a host of great vendor solutions we can get our arms around this threat. Technologically. But people are people and we love to click on stuff. Now, we must get our employees involved in the shared responsibility of security and awareness. So, people are the answer? This panel will discuss how we carefully blend People, Process, and Technology to strengthen the organization together.
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Lower Your Business Risk with Best Practice Data Privacy Impact Assessments
  • Live at: Jun 1 2020 1:00 pm
  • Presented by: Lecio DePaula Jr.
  • From:
Your email has been sent.
or close