Hi [[ session.user.profile.firstName ]]

Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim

There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

Join us for this webinar where, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and Gary Miliefsky, publisher of Cyber Defense Media Group, dive into:

- Why data backups (even offline backups) won’t save you
- Evolved threats from data-theft, credential leaks, and corporate impersonation
- Why ransomware isn’t your real problem
- How your end users can become your best, last line of defense
Recorded May 8 2020 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roger Grimes (KnowBe4), Gary Miliefsky (Cyber Defense Media Group)
Presentation preview: Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim Recorded: Jul 9 2020 50 mins
    Roger Grimes (KnowBe4), Tim Phillips (The Register)
    We’ve been hearing about ransomware for a few years now. You might even know a company that has been a victim and quietly paid up, and you might even know someone who’s told you not to worry. “It’s OK if you have a good backup,” they say.

    Well, think again. In the last few months, ransomware has gone nuclear. There is a reason more than half of today’s ransomware victims end up paying up. A new generation of attackers are crafting plans to cause the most panic, pain, and operational disruption. They will take the time to maximize your organization’s potential damage and also their payoff -- not just encrypting your data, but stealing it and posting it publicly if you don’t play ball.

    Roger Grimes from KnowBe4 joined Tim Phillips from The Reg for a live RegCast in which they sounded off on the ransomware emergency klaxon. They covered:

    - How sophisticated ransom attacks are stealing your data and what they do with it
    - Why your data backups alone can't protect you from nuclear ransomware
    - And, most important, how to protect yourself from the new nuclear threat
  • Combat the Fake News and Disinformation Being Used to Attack Your Organization Recorded: Jun 26 2020 61 mins
    Stu Sjouwerman (KnowBe4’s Founder and CEO), Perry Carpenter (KnowBe4’s Chief Evangelist and Strategy Officer)
    A global cold war is being fought in cyberspace, and IT pros like you are finding themselves in the trenches. With all of this going on, how can you equip your employees and protect your networks from a malicious attack?

    Join Stu Sjouwerman, KnowBe4’s Founder and CEO, and Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer for a deep dive into how the technology we rely on every day is being exploited to deliver powerful disinformation, misinformation, fake news, and other malicious exploits.

    We’ll discuss:

    - How both facts and lies are weaponized

    - Types of delivery systems (email, social media, videos, deep fakes, and more)

    - What’s being done to address these trends

    - Tips to protect your organization and build your human firewall
  • Find Out How to Use Your Organization's Data to Become a Risk Management Expert Recorded: Jun 25 2020 52 mins
    Roger Grimes
    Risk management is about recognizing the right risks, assigning the right likelihood, and assessing potential damage. Yet, most risk managers are doing it wrong, driven by decades of faulty risk management measurements and tools.

    Learn how you can use your organization's data to create new risk models that map to your real risk and apply a data-driven defense approach to identify the critical threats that your organization actually faces.

    Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, a 30-year security veteran and former auditor who has passed the CPA and CISA exams for this insightful presentation.

    Roger will show you:

    - How most risk managers are taught to calculate risk and why that's incorrect
    - How you can fix your risk calculation
    - How to use your own data to create new risk models that better map to your organization’s real risk
    - How to create a data-driven risk management plan using governance, risk management and compliance tools
  • Why the Human Factor is Still the Most Important Part of IT Security Recorded: Jun 22 2020 61 mins
    Rosa Smothers (KnowBe4), Teri Takai (Center for Digital Government)
    Smart network security involves a mix of hardware and software solutions designed to safeguard your data. But there’s another key security factor that’s just as vital, and it’s one that’s frequently neglected by technologists: the human element. Understanding the human risk factor and the role it plays in creating network vulnerabilities is vital to ensuring that your systems and your data are safely protected.

    And it’s never been more important for state and local tech leaders to get it right. The shutdowns and economic turmoil of the coronavirus pandemic have created a new world that’s ripe for hackers and scammers.
    Ransomware and malware attacks are up, and users working from home are more susceptible to phishing attempts and other attempts to gain access to your network. If you’re not focusing on the human element, you’re ignoring a crucial part of your overall security program.

    In this one-hour webinar, a panel of experts and thought leaders will discuss important topics including:

    - Why your users are your most important line of defense, and how you can build and empower your “human firewall”
    - How Covid-19 has reshaped the threat landscape, and how that will be affected by the economic crisis
    - What you can do now to make your organization a hard target for bad actors
    - How security awareness training can enable your employees to make smarter security decisions every day
  • Levers of Human Deception: The Science and Methodology Behind Social Engineering Recorded: Jun 19 2020 57 mins
    Erich Kron (KnowBe4), David Littman (TruthInIT)
    No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different levers that social engineers and scam artists pull to make us more likely to do their bidding.

    Join Erich Kron, Security Awareness Advocate for KnowBe4, provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by oily car dealers, to sophisticated social engineering and online scams. Additionally, we’ll look at how to ethically use the very same levers when educating our users.

    Key Takeaways:
    - The Perception Vs. Reality Dilemma
    - Understanding the OODA (Observe, Orient, Decide, Act) Loop
    - How social engineers and scam artists achieve their goals by subverting - - OODA Loop's different components
    - How we can defend ourselves and our organizations
  • Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate Links Recorded: Jun 12 2020 61 mins
    Roger Grimes
    Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your users into clicking and putting your network at risk. You need to stay a step ahead of the bad guys.

    Join us for this webinar when Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, shows you how to become a rogue URL expert.

    He’ll dive deep into the latest techniques and defenses to share:

    - Real-life examples of advanced attacks using rogue digital certificates, homograph attacks, and more
    - Safe forensic methods for examining URLs and other tactics for investigating phishy emails
    - Strategies for dissecting URLs on mobile without clicking
    - Simple ways you can train your users to scrutinize URLs and keep your network safe
  • Lower Your Business Risk with Best Practice Data Privacy Impact Assessments Recorded: Jun 1 2020 45 mins
    Lecio DePaula Jr.
    Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from Marriott’s acquisition of Starwood, not undergoing a full security and privacy assessment can present huge problems for your organization and now Marriott faces a $123.6 million dollar fine due to lack of due diligence.

    One way to reduce risks and identify security/privacy risk is to conduct a data protection impact assessment. Not only will this assessment help you reduce business risk, but it also helps identify new processes in your organization to maintain compliance with GDPR, LGPD, CCPA and other global privacy laws.

    Join Lecio DePaula Jr., KnowBe4’s Data Privacy Director, for this webinar to hear about creating a robust data protection impact assessment to analyze new processes, workflows, and products to identify problems before they happen.

    In this webinar you’ll learn:

    - Best practices for conducting a robust DPIA
    - The privacy and security risks of M&A, creating new software products, other initiatives
    - How conducting a DPIA aligns with global privacy requirements
    - Common DPIA mistakes and how to avoid them
    - Tools that help manage and streamline your DPIA process
  • Your Ransomware Task Force: Extortion, Crisis Management and Recovery Recorded: May 26 2020 59 mins
    Roger Grimes (KnowBe4), Bill Hardin (Charles River Associates)
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    Watch this on-demand webinar where Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, interviews Bill Hardin of Charles Rivers Associates for an exclusive webinar, Ransomware Expert Guide: Extortion, Crisis Management, and Recovery. Roger and Bill take a deep dive into ransomware forensics and recovery to help you prepare for a rapid response before a ransomware attack affects your organization.

    In this session you’ll learn:

    - Of the thousands of cyber events Bill has investigated what is different in 2020
    - Tactics and techniques your security team can use to hunt within your environment
    - Bill’s top 3 takeaways regarding ransomware recovery
    - How to enable your users to spot suspicious attacks before they affect you
  • 2020 Phishing by Industry Benchmarking Report: How Do You Measure Up? Recorded: May 21 2020 15 mins
    Javvad Malik, KnowBe4's Security Awareness Advocate for Europe
    As a security leader, you have a lot on your plate. Even as you increase your budget for sophisticated security software, your exposure to cybercrime keeps going up. IT security seems to be a race between effective technology and ever evolving attack strategies from the bad guys. However, there’s an often-overlooked security layer that can significantly reduce your organisation’s attack surface: New-school security awareness training.

    Watch Javvad Malik, KnowBe4’s Security Awareness Advocate for Europe, in this video webinar for a review of KnowBe4’s latest Phishing By Industry Benchmarking Report, a data set of nearly four million users across 17,000 organisations.

    You will learn more about:

    · New phishing benchmark data for 19 industries

    · Understanding who’s at risk and what you can do about it

    · Actionable tips to create your “human firewall”

    · The value of new-school security awareness training

    Do you know how your organisation compares to your peers? Watch this webinar to find out!
  • Your Ransomware Task Force: Critical Steps for Responding to a Ransomware Attack Recorded: May 20 2020 61 mins
    Roger Grimes (KnowBe4), John Mullen (Mullen Coughlin)
    When you realize your organization has been hit with a ransomware attack there are a few things that need to happen. One… take a deep breath. Two… contain the damage. And three… initiate your recovery plan IMMEDIATELY.

    To help you prepare for a rapid response Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, interviewed John Mullen, of Mullen Coughlin LLC, who is a seasoned, hands-on ransomware and data loss professional. John has served as a “Breach Coach” to thousands of affected organizations to help them contain and investigate ransomware attacks.

    In this session you’ll learn:

    - The number one mistake most ransomware victims are making today
    - When you need to call a “Breach Coach” and what they can do to help
    - Rapid response steps you need to take when your organization gets hit
    - Why new-school security awareness training is more critical than ever before
  • Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain Recorded: May 19 2020 59 mins
    James McQuiggan
    Your customer data, intellectual property, and financials are the lifeblood of your organization. If lost or leaked, there could be significant implications to the viability of your business. Maintaining control of that data, especially with third-party services, can be extremely challenging and requires that you ask the right questions and enforce stringent security policies.

    In an environment of increased outsourcing, cloud computing adoption, and regulatory requirements, how do you manage vendor risk and ensure you have a consistent evaluation life cycle

    Join James McQuiggan, KnowBe4's Security Awareness Advocate, to get actionable steps you can use now to better manage your third-party vendor risk. You'll learn:

    The importance of securing your organization's critical data
    How to determine Supplier Security Proficiency
    Why it’s important to understand the source of third-party products
    The impact Vendor Questionnaires have on your Security Posture
    How leveraging a GRC platform can ease the burden of risk assessments and audits
  • The Pandemic of Ransomware: How Cyber Criminals React to the Chaos Recorded: May 15 2020 64 mins
    Erich Kron (KnowBe4), Bruce Sussman (SecureWorld)
    Phishing is the number one way that the bad guys infect computers with malware like ransomware. With the world at a practical standstill and in utter chaos, one thing that has not slowed down is the amount of phishing attacks, and thus the number of ransomware attacks. In fact, attempts by cybercriminals to infiltrate networks has increased during these uncertain times. It's estimated that Google has blocked nearly 18 million COVID-19 related phishing attacks. People are less secure now, and the bad guys know it.

    Join Erich Kron, Security Awareness Advocate at KnowBe4, and Bruce Sussman of SecureWorld as they discuss the latest advances in ransomware, phishing trends, and why it's more important than ever to have a strong security culture within your organization.
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim Recorded: May 8 2020 64 mins
    Roger Grimes (KnowBe4), Gary Miliefsky (Cyber Defense Media Group)
    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

    Join us for this webinar where, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and Gary Miliefsky, publisher of Cyber Defense Media Group, dive into:

    - Why data backups (even offline backups) won’t save you
    - Evolved threats from data-theft, credential leaks, and corporate impersonation
    - Why ransomware isn’t your real problem
    - How your end users can become your best, last line of defense
  • Cyber CSI: Learn How to Forensically Examine Phishing Emails Recorded: May 1 2020 61 mins
    Roger Grimes, David Littman
    Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network. Staying a step ahead may even involve becoming your own cyber crime investigator, forensically examining actual phishing emails to determine the who, the where, and the how.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, and David Littman from TruthInIT, will show you how to become a digital private investigator! You’ll learn:

    How to forensically examine phishing emails and identify other types of social engineering
    What forensic tools and techniques you can use right now
    How to investigate rogue smishing, vishing, and social media phishes
    How to enable your users to spot suspicious emails sent to your organization
    Get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late!
  • The Importance of Matching Security Awareness Content to Your Target Audience Recorded: Apr 23 2020 29 mins
    Perry Carpenter, Joanna Huisman
    Security awareness is critical to protecting your organization’s most valuable information, but there is a huge difference between a one-size fits all approach versus new-school security security awareness training. Your users are humans, after all, not computers, and they all learn in different ways and have a variety of needs. Find out why providing a wide variety of content to your users helps ensure that they not only retain but use this vital information.

    Join Perry Carpenter, KnowBe4’s Chief Strategy Officer, and Joanna Huisman, SVP of Strategic Insights and Research, as they dive into why having a content strategy is so important to your security awareness training program. They discuss topics like:

    - How to ensure content is consumed, retained and acted upon
    - Why capturing and maintaining the attention of your users is so critical
    - The importance of speaking to different learning styles
    - The difference storytelling can make in message retention
  • The Art of Invisibility featuring Kevin Mitnick and Perry Carptenter Recorded: Apr 20 2020 65 mins
    Kevin Mitnick, Perry Carpenter
    Corporate privacy concerns are more paramount right now than ever before. Organizations are being forced to maneuver a new world of security and privacy issues related to a remote workforce, evolving hardware/software needs, and employee access policies. Kevin Mitnick knows this world well. In fact, that's the topic of his book, The Art of Invisibility.

    Join us for this exclusive webinar as Kevin Mitnick, KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, enter into an eye-opening discussion of the expected and unexpected risks this workforce evolution brings.

    They will discuss topics including:

    - Privacy concerns around employees using personal devices for business purposes
    - Security issues with various operating systems, mobile devices, and the Internet of Things
    - The reality of "deep privacy" and how tied together devices, systems, and surveillance really are
    - Shocking new demonstrations that will change the way you think about privacy
    - Why new-school security awareness training is more critical than ever before
  • Africa - You've Been Phished: The State of the Human Factor in Cybersecurity Recorded: Apr 13 2020 68 mins
    Anna Collard, Managing Director od KnowBe4 Africa & Joanna Huisman, SVP of Strategic Insights and Research
    Cybercriminals are quickly shifting their attention to the African continent and other emerging economies. The sharp increase in digitization and mobile financial transactions, as well as a relatively unregulated environment, makes Africa highly attractive for criminals. How can you prepare your organization to deal with this increased risk to the region?

    Join Anna Collard, Managing Director of KnowBe4 Africa, and Joanna Huisman, SVP of Strategic Insights and Research, as they discuss the findings from the KnowBe4 Africa Cybersecurity Awareness Report and share actionable security tips you can use now.

    You will learn about:

    The most at-risk countries in Africa and the unique challenges they face
    The cybercrime status on the African continent
    Why phishing, malware and credential theft is a huge risk
    Tips that can be used now to help keep your organization safe
    The importance of training your users to create your human firewall
    Don’t let your organization become the next victim! Learn how you can better protect your network today.
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim Recorded: Apr 10 2020 103 mins
    Roger Grimes (KnowBe4), Sam Masiello (Gates Corporation), Tom Bechtold (SecureWorld)
    Join Roger Grimes, SecureWorld's Tom Bechtold, and Gates Corporation CISO Sam Masiello as they discuss the ever changing (and scary) world of ransomware.

    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

    They dive into:

    Why data backups (even offline backups) won’t save you
    Evolved threats from data-theft, credential leaks, and corporate impersonation
    Why ransomware isn’t your real problem
    How your end users can become your best, last line of
    defense
  • The Many Ways to Hack Multi-Factor Authentication Recorded: Apr 8 2020 62 mins
    Roger Grimes, David Littman
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, a security expert with over 30-years experience, and David Littman of TruthInIT for this video webinar where they will explore 12 ways hackers can and do get around your favorite MFA solution.

    The on-demand webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Is Your Traditional Security Stack Giving You A False Sense of Security? Recorded: Apr 7 2020 61 mins
    Kevin Mitnick, Perry Carpenter
    Endpoint security, firewalls, VPNs, authentication systems… we’ve all got them. But do they really provide the comprehensive level of security your organization needs to keep the bad guys out? The unfortunate reality is that each of these security layers can provide hackers with a back-door right into your organization. And we're going to show you how.

    In this exclusive webinar Kevin Mitnick, the World's Most Famous Hacker and KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, show you shocking examples of significant vulnerabilities that social engineers and hackers use to circumvent these traditional security layers.

    There is no need for a false sense of security. Better defend your network by learning:

    - The 3 most common causes of data breaches
    - Significant vulnerabilities recently discovered in common technologies
    - Kevin’s top tips for security defenders
    - Why security awareness training is a security layer you can’t afford to skip

    Kevin shares new hacking demos that will scare the daylights out of you. Find out how to mitigate these risks before it’s too late!
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim
  • Live at: May 8 2020 9:35 pm
  • Presented by: Roger Grimes (KnowBe4), Gary Miliefsky (Cyber Defense Media Group)
  • From:
Your email has been sent.
or close