Hi [[ session.user.profile.firstName ]]

Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use

Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows.

The truth is that it is shockingly easy to gather detailed intelligence on individuals and organizations. Everything the bad guys need to specifically target your end users is out there for the taking. Banking and credit card accounts, driver's license numbers, geolocation details and even IT secrets can be found easily and through public resources! There’s even a name for it: Open Source Intelligence (OSINT).

In this mind-blowing webinar, Kevin and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, give you an inside look into some of Kevin’s most prized, underground OSINT secrets and how the bad guys use those techniques to target your users and your organizations.

Find out what to watch out for and learn how to strengthen your end-user “human firewall” against OSINT-fueled attacks before it's too late!
Recorded Jan 10 2020 70 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Mitnick, Perry Carpenter
Presentation preview: Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Spotting and Defending Against Common Business Email Compromise Tax Scams Recorded: Jan 17 2020 49 mins
    Erich Kron, James McQuiggan
    Tax season is upon us, which makes this prime time for hackers to target your unsuspecting users with the latest Business Email Compromise (BEC) scams. From evolved W2 fraud to tax-related spear phishing, cybercriminals capitalize on the first quarter of each new year with smarter, craftier attacks designed to convince your users to provide confidential information, authorize wire transfers, or enable malicious files.

    In this webinar Erich Kron and James McQuiggan, KnowBe4 Security Awareness Advocates, discuss the new types of BEC scams you can expect to see, what your users should be on alert for this tax season, and how to protect your organization from these evolved threats.

    You will learn:
    - Real-world examples of the latest BEC attacks
    - Common targets within your organization and techniques used to trick them
    - Red flags your users need to know now to spot BEC attacks
    - How to educate your organization so you don’t fall victim

    Don't let your organization become a statistic this tax season! Join our experts to find out how to stop the bad guys before it's too late.
  • Ransomware Hostage Rescue Manual Recorded: Jan 16 2020 55 mins
    Erich Kron, David Littman
    It is estimated that a business falls victim to a ransomware attack every 40 seconds, adding up to a projected $11.5 billion in damages for this year. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.
  • Find Out the Top 9 IT Security Trends You Need to Watch Out for in 2020 Recorded: Jan 14 2020 22 mins
    Roger Grimes, Erich Kron, Javvad Malik
    Cyber security and security awareness landscapes are constantly changing. IT Professionals, like you, always need to know what is coming next in order to build (and maintain) effective security cultures and programs at your organization. Policy changes, evolving technologies, and even world events all play a part in attack vectors and how you respond to threats.

    To help you master the challenges ahead, KnowBe4 Evangelists, Roger Grimes, Javvad Malik and Erich Kron, share their top predictions for the coming year and discuss where the future of security awareness is heading in 2020.

    You'll want to watch this video to see their predictions for:

    •The future of privacy and data protection policies around the world
    •Changes to voting procedures and factors impacting election security
    •How the Internet of Everything and evolved spear phishing will make spotting attacks even harder
    •How you can prepare your users now to identify the threats of tomorrow

    Don’t get caught by surprise - watch their predictions now!
  • The Many Ways to Hack Multi-Factor Authentication Recorded: Jan 14 2020 62 mins
    Roger Grimes, David Littman
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, a security expert with over 30-years experience, and David Littman of TruthInIT for this video webinar where they will explore 12 ways hackers can and do get around your favorite MFA solution.

    The on-demand webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use Recorded: Jan 10 2020 70 mins
    Kevin Mitnick, Perry Carpenter
    Ever wonder how hackers, spies, and con-artists gather such detailed and convincing intel on their targets? Kevin Mitnick, the world's most famous hacker and KnowBe4's Chief Hacking Officer, knows.

    The truth is that it is shockingly easy to gather detailed intelligence on individuals and organizations. Everything the bad guys need to specifically target your end users is out there for the taking. Banking and credit card accounts, driver's license numbers, geolocation details and even IT secrets can be found easily and through public resources! There’s even a name for it: Open Source Intelligence (OSINT).

    In this mind-blowing webinar, Kevin and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, give you an inside look into some of Kevin’s most prized, underground OSINT secrets and how the bad guys use those techniques to target your users and your organizations.

    Find out what to watch out for and learn how to strengthen your end-user “human firewall” against OSINT-fueled attacks before it's too late!
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network Recorded: Jan 9 2020 60 mins
    Roger Grimes, David Littman
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:

    - How detailed data is harvested using public databases and surprising techniques
    - Tricks used to craft a compelling social engineering attack that your users WILL click
    - Cunning ways hackers deliver malicious code to take control of an endpoint
    - Taking over your domain controller and subsequently your entire network

    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • Is Your Traditional Security Stack Giving You A False Sense of Security? Recorded: Jan 7 2020 61 mins
    Kevin Mitnick, Perry Carpenter
    Endpoint security, firewalls, VPNs, authentication systems… we’ve all got them. But do they really provide the comprehensive level of security your organization needs to keep the bad guys out? The unfortunate reality is that each of these security layers can provide hackers with a back-door right into your organization. And we're going to show you how.

    In this exclusive webinar Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, show you shocking examples of significant vulnerabilities that social engineers and hackers use to circumvent these traditional security layers.

    There is no need for a false sense of security. Better defend your network by learning:

    - The 3 most common causes of data breaches
    - Significant vulnerabilities recently discovered in common technologies
    - Kevin’s top tips for security defenders
    - Why security awareness training is a security layer you can’t afford to skip

    Kevin shares new hacking demos that will scare the daylights out of you.  Find out how to mitigate these risks before it’s too late!
  • Critical Considerations When Choosing Your Security Awareness Vendor Recorded: Jan 7 2020 58 mins
    Perry Carpenter
    It’s become more and more evident to organizations that new-school security awareness training is an absolute requirement for managing the ongoing problem of social engineering. But how do you develop a program that will deliver the goods without doubling your workload or costing an arm and a leg?

    In this on-demand webinar Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer and former Gartner Analyst, steps you through key measures that will help you make an informed security awareness decision for your organization.

    You’ll gain insight into:

    - Critical components to make your program successful from the start
    - Features to look for that will ease implementation and ongoing management
    - How to create a process to demonstrate measurable success

    Find out now how you can not only check the box on security awareness training, but develop sustainable, meaningful change in your organization's security posture.
  • Lower Your Business Risk with Best Practice Data Privacy Impact Assessments Recorded: Jan 6 2020 45 mins
    Lecio DePaula Jr.
    Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from Marriott’s acquisition of Starwood, not undergoing a full security and privacy assessment can present huge problems for your organization and now Marriott faces a $123.6 million dollar fine due to lack of due diligence.

    One way to reduce risks and identify security/privacy risk is to conduct a data protection impact assessment. Not only will this assessment help you reduce business risk, but it also helps identify new processes in your organization to maintain compliance with GDPR, LGPD, CCPA and other global privacy laws.

    Join Lecio DePaula Jr., KnowBe4’s Data Privacy Director, for this webinar to hear about creating a robust data protection impact assessment to analyze new processes, workflows, and products to identify problems before they happen.

    In this webinar you’ll learn:

    - Best practices for conducting a robust DPIA
    - The privacy and security risks of M&A, creating new software products, other initiatives
    - How conducting a DPIA aligns with global privacy requirements
    - Common DPIA mistakes and how to avoid them
    - Tools that help manage and streamline your DPIA process
  • How to Gain and Maintain Executive Support for Security Awareness Training Recorded: Dec 23 2019 39 mins
    Perry Carpenter
    You know that having a healthy and functioning security awareness culture within your organization is key to avoiding a costly data breach. Your employees are your last line of defense against phishing attacks and keeping them on their toes and aware of the latest threats is critical. However, getting buy-in from executives to start, and more importantly, maintain a new-school security awareness program can prove to be a challenge.

    In this webinar, Perry Carpenter, Chief Evangelist and Strategy Office at KnowBe4, helps you detangle the complicated web of politics around securing executive support for security awareness training.

    - Get actionable insights on:
    - Capturing executive attention
    - How to frame the story of your program’s value position
    - What to measure before you present your program
    - How to not drown your executives in data
    - Setting intentional and actionable goals for your program
  • Best Practices for Creating Order from Phish Reporting Chaos Recorded: Dec 11 2019 41 mins
    Greg Kras, Perry Carpenter
    When Greg Kras, KnowBe4’s Chief Product Officer, first rolled out our Phish Alert Button (your users can use it to report suspicious emails), he thought it would be a great way for you to stay up-to-date on actual phishing emails occurring in the wild. Well, he was right but there was also an “interesting side effect”.

    Phish reports grew from a couple hundred emails in the beginning to 10,000+ messages per day! Like you, KnowBe4’s team had to adapt our processes to deal with the influx of reports and create mechanisms to facilitate prioritization, enabling the team to take action.

    Join Greg and Perry Carpenter, KnowBe4 Chief Strategy Officer, as they explore the challenges and opportunities for creating order from your organization’s phish reporting chaos. Learn useful tips and best practices from in the trenches lessons learned to turning today’s “see something, say something” world into an asset rather than a liability.

    Listen to hear about:

    - How to maintain business continuity by returning “clean” messages as fast as possible
    Enriching email data and clustering into groups to expedite prioritization and follow up
    - How Artificial Intelligence and Machine Learning can help you spot real malicious emails even faster
    - How automating your email disposition process can save you so much time
  • Security Awareness: Securing the Human Layer Recorded: Dec 10 2019 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
  • Ransomware 2020 Recorded: Dec 9 2019 36 mins
    Erich Kron, Stephen Lawton
    As we approach a new decade on the calendar, we also are approaching new techniques and technologies being used by attackers and defenders alike.

    Understanding what’s possible by the attackers helps companies build better defenses, but is it possible to guess what approach will be used next?

    This 20/20 webcast looks at the current state of ransomware and other email-borne attacks and provides some insights on what you can and should be doing – and perhaps not doing – to prevent attacks.
  • Hacking Your Organization: 7 Steps Bad Guys Use to Take Control of Your Network Recorded: Dec 9 2019 60 mins
    Roger Grimes, David Littman
    The scary fact is that human error is a contributing factor in more than 90% of breaches. With so many technical controls in place hackers are still getting through to your end users, making them your last line of defense. How are they so easily manipulated into giving the bad guys what they want? Well, hackers are crafty. And the best way to beat them is to understand the way they work.

    In this webinar Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will take you through the "Cyber Kill Chain" in detail to show you how a single email slip up can lead to the total takeover of your network.

    Roger will show you:

    - How detailed data is harvested using public databases and surprising techniques
    - Tricks used to craft a compelling social engineering attack that your users WILL click
    - Cunning ways hackers deliver malicious code to take control of an endpoint
    - Taking over your domain controller and subsequently your entire network

    But not all hope is lost. Roger will also share actionable strategies you can put in place now to greatly reduce your risk. Find out how to protect your organization before it's too late.
  • A Former CIA Threat Analyst Shares Security Practices You Should Be Implementing Recorded: Dec 5 2019 59 mins
    Rosa Smothers. Justin Ong, Juan Hernandez
    Having spent over a decade as part of the CIA’s Center for Cyber Intelligence and the Counterterrorism Mission Center, Rosa Smothers knows the ins and outs of leading cyber operations against terrorists and nation-state adversaries. She has seen first-hand how the bad guys operate, she knows the threat they pose, and she can tell you how to use that knowledge to harden your organization’s defense.

    In this exclusive webinar, we’ll find out why Rosa, now KnowBe4’s SVP of Cyber Operations, encourages organizations like yours to maintain a healthy sense of paranoia as she walks you through the murky underworld of threats and exploits that your organization can't afford to ignore. We’ll also be joined by an IT pro from the Spiceworks Community.

    Here’s what we’ll discuss:

    - Understanding physical security risks like tailgating and badge impersonation, and the tactics secure organizations use to prevent this
    - Surprising data collection techniques – both physical and cyber
    - The pros (and cons) of MFA and why your company needs to take password security seriously
    - How you can educate and prepare your end users to defend against them all
  • Levers of Human Deception Recorded: Dec 5 2019 52 mins
    Erich Kron, David Littman
    No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

    Join Erich Kron, Security Awareness Advocate at KnowBe4 and David Littman from TruthInIT, as they provide fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, We'll look at how to ethically use the very same levers when educating our users.

    Key Takeaways:
    - The Perception Vs. Reality Dilemma
    - Understanding the OODA (Observe, Orient, Decide, Act) Loop
    - How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
    - How we can defend ourselves and our organizations
  • Top Security Trends in Europe Recorded: Dec 4 2019 21 mins
    Javvad Malik, Jelle Wieringa
    Defending your organization against cyber threats is not a one-size-fits-all approach. Cultural differences, language barriers, regional policies and more can mean that what is happening (and working) in North America in the IT security space may not necessarily fit the bill in other parts of the world.

    In this discussion, Javvad Malik and Jelle Wieringa, European-based Security Awareness Advocates for KnowBe4, share their insights on current and future cybersecurity trends across Europe that your organization needs to know about.

    They discuss:

    - The far-reaching implications of GDPR
    - What SOCs need to be doing differently in Europe compared to their North American counterparts
    - The evolution of security awareness in Europe
    - Emerging threats and applications of deepfake technology
    - What the future may hold and how Europe is leading the world in privacy

    Join Javvad and Jelle as they tackle how you and your organization can better prepare and defend against these ever-changing threats.
  • Third-Party Phishing: The Phishing Attacks That Traditional Defenses Don't Stop Recorded: Dec 3 2019 55 mins
    Erich Kron
    Because third-party phishing attacks look like legitimate emails from your vendors’ domains, traditional defenses often don't work against them or they are severely weakened. Your only defense is a strong human firewall. Find out how third-party phishing attacks operate, how you can spot them, and learn what defenses do and don't work against them.

    Join Erich Kron, Security Defense Evangelist at KnowBe4, to see:

    - Real-world examples of third-party phishing schemes
    - Hacking techniques that make these targeted attacks even more dangerous
    - How to protect your network against these aggressive schemes
    - What to teach your end users so they can identify a third-party attack
  • Your Ultimate Guide to Phishing Mitigation Recorded: Nov 21 2019 61 mins
    Roger Grimes, David Littman
    Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait.

    This webinar, hosted by Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, covers a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We didn't just cover one angle. We’ll came at it from all angles!

    Join Roger as he dives deep to teach you how to develop a comprehensive, defense-in-depth plan, introduces technical controls all organizations should consider, covers the benefits of new-school security awareness training, and goes over the best practices for creating and implementing security policies, all while staying phish-free!
  • A Former CIA Threat Analyst Shows How to Make Your Organization a Hard Target Recorded: Nov 1 2019 62 mins
    Rosa Smothers, Perry Carpenter
    Having spent over a decade as part of the CIA’s Center for Cyber Intelligence and the Counterterrorism Mission Center, Rosa Smothers knows the ins and outs of leading cyber operations against terrorists and nation-state adversaries. She has seen first-hand how the bad guys operate, she knows the threat they pose, and she can tell you how to use that knowledge to make organizations like yours a “hard target”.

    In this exclusive webinar, we find out why Rosa, now KnowBe4’s SVP of Cyber Operations, encourages organizations like yours to maintain a healthy sense of paranoia as she and Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, walk you through the murky underworld of threats and exploits that your organization can't afford to ignore.

    Get the inside (spy-)scoop on:

    - Surprising data collection techniques – both physical and cyber
    - The two easiest ways to break into any existing network
    - Hidden threats of social media connections
    - And how to prepare your end users to defend against them all
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Open Source Intelligence (OSINT): Hacking Sources Data Sources That Bad Guys Use
  • Live at: Jan 10 2020 3:00 pm
  • Presented by: Kevin Mitnick, Perry Carpenter
  • From:
Your email has been sent.
or close