Hi [[ session.user.profile.firstName ]]

Security Awareness: Securing the Human Layer

It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
Recorded Jul 30 2020 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roger Grimes, Scott Lowe
Presentation preview: Security Awareness: Securing the Human Layer

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain Recorded: Sep 24 2020 59 mins
    James McQuiggan
    Your customer data, intellectual property, and financials are the lifeblood of your organization. If lost or leaked, there could be significant implications to the viability of your business. Maintaining control of that data, especially with third-party services, can be extremely challenging and requires that you ask the right questions and enforce stringent security policies.

    In an environment of increased outsourcing, cloud computing adoption, and regulatory requirements, how do you manage vendor risk and ensure you have a consistent evaluation life cycle

    Join James McQuiggan, KnowBe4's Security Awareness Advocate, to get actionable steps you can use now to better manage your third-party vendor risk. You'll learn:

    The importance of securing your organization's critical data
    How to determine Supplier Security Proficiency
    Why it’s important to understand the source of third-party products
    The impact Vendor Questionnaires have on your Security Posture
    How leveraging a GRC platform can ease the burden of risk assessments and audits
  • Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate Links Recorded: Sep 23 2020 61 mins
    Roger Grimes
    Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your users into clicking and putting your network at risk. You need to stay a step ahead of the bad guys.

    Join us for this webinar when Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, shows you how to become a rogue URL expert.

    He’ll dive deep into the latest techniques and defenses to share:

    - Real-life examples of advanced attacks using rogue digital certificates, homograph attacks, and more
    - Safe forensic methods for examining URLs and other tactics for investigating phishy emails
    - Strategies for dissecting URLs on mobile without clicking
    - Simple ways you can train your users to scrutinize URLs and keep your network safe
  • Think Like a Hacker: Learn How to Use OSINT to Defend Your Organization Recorded: Sep 22 2020 57 mins
    Rosa Smothers, SVP of Cyber Operations at KnowBe4
    In today's digital age we are surrounded by massive amounts of data every day. This makes it ridiculously easy to gather shockingly detailed information about anyone… even your organization. Bad actors use open source intelligence (OSINT) techniques to gather this inside knowledge and create attacks your users will click on. No one knows this better than former CIA Cyber Threat Analyst and Technical Intelligence Officer, Rosa Smothers. But she can show you how to use OSINT to turn the tables on the bad guys and regain the upper hand.

    Join us as Rosa, now KnowBe4's SVP of Cyber Operations shares her insights on how to leverage OSINT to defend your organization and think like a hacker!

    Rosa will show you:

    How to go beyond general OSINT techniques to gather the details you need for effective investigations

    Apps and analytic techniques that enhance your research and data interpretation

    Live demonstrations of OSINT gathering techniques you can use before the bad guys do

    How training your users to understand OSINT and their digital footprint can protect your organization from threat actors

    Learn how to use hackers' best techniques against them!
  • You've Got Humans on Your Network! Recorded: Sep 22 2020 71 mins
    Joanna Huisman (KnowBe4), Dr. Christopher Pierson (BlackCloak), Trip Hillman (Weaver), Tom Bechtold (SecureWorld)
    They are all over your network doing all sorts of things with company data. Most of them are doing exactly what they are supposed to be doing. Nothing new to report there but do you know who they all are? Should they have that level of access? Why is Carol in accounting downloading 1 TB of data? Did John in sales just send the competitors a price list? When is the last time you REALLY did some security awareness training besides that one video you sent 6 months ago?

    Now people are working from home. Who is using this corporate device? Where did this Chromebook come from on the network?

    We have a lot of questions and a lot of work ahead of us as it relates to the human element and Information Security. Some say there is are technical controls we need to put in place. Some say it is merely adopting a company culture shift toward security. The truth is probably somewhere in the middle. Bring our panelists your questions and let’s help our end-users!
  • Now That Ransomware Has Gone Nuclear, How Can You Avoid Becoming the Next Victim Recorded: Sep 22 2020 103 mins
    Roger Grimes (KnowBe4), Sam Masiello (Gates Corporation), Tom Bechtold (SecureWorld)
    Join Roger Grimes, SecureWorld's Tom Bechtold, and Gates Corporation CISO Sam Masiello as they discuss the ever changing (and scary) world of ransomware.

    There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear.

    They dive into:

    Why data backups (even offline backups) won’t save you
    Evolved threats from data-theft, credential leaks, and corporate impersonation
    Why ransomware isn’t your real problem
    How your end users can become your best, last line of
    defense
  • Why the Human Factor is Still the Most Important Part of IT Security Recorded: Sep 21 2020 61 mins
    Rosa Smothers (KnowBe4), Teri Takai (Center for Digital Government)
    Smart network security involves a mix of hardware and software solutions designed to safeguard your data. But there’s another key security factor that’s just as vital, and it’s one that’s frequently neglected by technologists: the human element. Understanding the human risk factor and the role it plays in creating network vulnerabilities is vital to ensuring that your systems and your data are safely protected.

    And it’s never been more important for state and local tech leaders to get it right. The shutdowns and economic turmoil of the coronavirus pandemic have created a new world that’s ripe for hackers and scammers.
    Ransomware and malware attacks are up, and users working from home are more susceptible to phishing attempts and other attempts to gain access to your network. If you’re not focusing on the human element, you’re ignoring a crucial part of your overall security program.

    In this one-hour webinar, a panel of experts and thought leaders will discuss important topics including:

    - Why your users are your most important line of defense, and how you can build and empower your “human firewall”
    - How Covid-19 has reshaped the threat landscape, and how that will be affected by the economic crisis
    - What you can do now to make your organization a hard target for bad actors
    - How security awareness training can enable your employees to make smarter security decisions every day
  • It All Started with a Phish... Recorded: Sep 16 2020 60 mins
    Roger Grimes (Data-Driven Defense Evangelist, KnowBe4), David Bayer (VP Program Management & Product Marketing, Vailmail)
    We all have come to understand that most of the successful breaches started with a phishing attack. Through use of technologies such as DMARC, DKIM, SPF, MFA, and a host of great vendor solutions we can get our arms around this threat. Technologically. But people are people and we love to click on stuff. Now, we must get our employees involved in the shared responsibility of security and awareness. So, people are the answer? This panel will discuss how we carefully blend People, Process, and Technology to strengthen the organization together.
  • The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You Recorded: Sep 16 2020 60 mins
    Roger Grimes, David Littman
    With malware attacks on the rise, making sure you keep your organization safe from a costly breach is a top priority. The two best things you can do to stop malware and ransomware attacks are to figure out how malware is getting by your defenses and for how long. Your current antivirus vendor isn’t going to tell you the answers to either of these. But Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, will. Join him as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about. He’ll show you: • The two best questions to ask to prevent malware and ransomware • The most common ways malware gets around your defenses • A live malware demonstration and how you can prevent it immediately • Step-by-step action plans you can start implement now • How to enable your end users to become your best, last line of defense Stop playing reactive defense. Go on the offensive! Use your existing data to craft a better malware defense today.
  • Ransomware Hostage Rescue Manual 2020 Recorded: Sep 10 2020 61 mins
    Erich Kron
    Ransomware attacks are on the rise — and they’re estimated to cost global organizations $20 billion by 2021 with government agencies, healthcare providers, and educational institutions in the U.S. impacted by ransomware attacks at a cost of more than $7.5 billion in 2019 alone. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.

    In this webcast we will cover:
    · What new scary ransomware strains are in the wild
    · Am I infected?
    · I’m infected, now what?
    · Proven methods of protecting your organization?
    · How to create a “human firewall”

    Don’t get held hostage and become a statistic! Join us to learn how to avoid these scary attacks.
  • Stump the Shark: Ask Roger Grimes Your Most Burning IT Security Questions! Recorded: Sep 10 2020 62 mins
    Roger Grimes, Erich Kron
    Have you ever wanted to pick the brain of one of the most prolific IT security experts? Now is your chance! In our “Ask Me Anything” session with Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

    Roger is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 12 books and over 1,000 magazine articles on computer security. He is itching to share his knowledge with YOU!

    Ask Roger anything, from your most burning IT security questions, how to get your security awareness program off the ground, or how he got his start in the industry. Try to stump him with your hardest questions! This session will be moderated by Erich Kron, KnowBe4's Security Awareness Advocate.

    You won’t want to miss this opportunity to chat with Roger and Erich!
  • The Mind’s Lie: How our Thoughts and Actions can be Hacked and Hijacked Recorded: Sep 10 2020 20 mins
    Perry Carpenter
    Discover the art and science behind deception… and why you may still fall for dirty tricks even after you understand how they work. From the slight-of-hand used by magicians, to the slight-of-tongue used by politicians, we are all wired to deceive and to be deceived. See how threat actors use these techniques against your users and how security awareness training can help them spot deceptions before it’s too late.
  • Find Out How to Use Your Organization's Data to Become a Risk Management Expert Recorded: Sep 9 2020 52 mins
    Roger Grimes
    Risk management is about recognizing the right risks, assigning the right likelihood, and assessing potential damage. Yet, most risk managers are doing it wrong, driven by decades of faulty risk management measurements and tools.

    Learn how you can use your organization's data to create new risk models that map to your real risk and apply a data-driven defense approach to identify the critical threats that your organization actually faces.

    Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, a 30-year security veteran and former auditor who has passed the CPA and CISA exams for this insightful presentation.

    Roger will show you:

    - How most risk managers are taught to calculate risk and why that's incorrect
    - How you can fix your risk calculation
    - How to use your own data to create new risk models that better map to your organization’s real risk
    - How to create a data-driven risk management plan using governance, risk management and compliance tools
  • Cyber CSI: Learn How to Forensically Examine Phishing Emails Recorded: Aug 20 2020 85 mins
    Roger Grimes (KnowBe4), Tom Bechtold (SecureWorld)
    Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network. Staying a step ahead may even involve becoming your own cyber crime investigator, forensically examining actual phishing emails to determine the who, the where, and the how.

    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will show you how to become a digital private investigator! You’ll learn:

    - How to forensically examine phishing emails and identify other types of social engineering
    - What forensic tools and techniques you can use right now
    - How to investigate rogue smishing, vishing, and social media phishes
    - How to enable your users to spot suspicious emails sent to your organization

    Get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late!
  • The Best Ways to Stop Malware and Ransomware That No One Else Will Tell You Recorded: Aug 20 2020 61 mins
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    With malware attacks on the rise, making sure you keep your organization safe from a costly breach is a top priority. The two best things you can do to stop malware and ransomware attacks are to figure out how malware is getting by your defenses and for how long. Your current antivirus vendor isn’t going to tell you the answers to either of these. But Roger Grimes, Data-Driven Defense Evangelist at KnowBe4, will.

    Join him as he dives into the best ways to stop malware dead in its tracks using real-life methods no one else is talking about.

    He’ll show you:

    - The two best questions to ask to prevent malware and ransomware
    - The most common ways malware gets around your defenses
    - A live malware demonstration and how you can prevent it immediately
    - Step-by-step action plans you can start implement now
    - How to enable your end users to become your best, last line of defense

    Stop playing reactive defense. Go on the offensive! Use your existing data to craft a better malware defense today.
  • Ask Me Anything with Kevin Mitnick - The World’s Most Famous Hacker Recorded: Aug 14 2020 41 mins
    Kevin Mitnick, KnowBe4's Chief Hacking Officer and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer
    *From Black Hat USA 2020*

    Ever want to pick the brain of The World’s Most Famous Hacker? This is your chance! Kevin Mitnick will share stories from trenches and answer questions in this unique and informative session. Plus, he'll share an eye-opening hacking demo. You don't want to miss this one-of-a-kind session!
  • Dark Reading Interviews Roger Grimes about Data-Driven Defense Recorded: Aug 14 2020 11 mins
    Terry Sweeney, Dark Reading Contributing Editor and Roger Grimes, KnowBe4's Data-Driven Defense Evangelist
    Terry Sweeney, a Contributing Editor with Dark Reading, speaks with Roger Grimes, KnowBe4's Data-Driven Defense Evangelist in preparation for Black Hat USA 2020. They discuss what data-driven defense means and how organizations can put the concept to work in their own organizations.
  • SecureWorld Panel: Cybercriminals at Work Recorded: Aug 11 2020 64 mins
    Roger Grimes (KnowBe4), Ashley Stephenson (Corero Networks), Colonel Cedric Leighton, Bruce Sussman (SecureWorld)
    Modern civilization has always been plagued by various classes of criminals. The advent of interconnected devices, allowing for portability of corporate secrets, has given rise to a completely different class of nefarious actors. Cybercriminals range from those bent on stealing your personal information to "cyber terrorists" who have the capability to inflict harm on a much wider scale. Uninhibited by current laws, they are very effective given the speeds of networks, lack of appropriate security controls, and the anonymous nature of the attacker. Making matters worse, the crime may be perpetrated by entities outside of the legal jurisdiction where the unlawful act took place.

    This panel discussion will explore the tools these criminals use, what can be done to prevent them, and how to safeguard your data.
  • Cyber Security: Employee Awareness in the New Normal Recorded: Aug 11 2020 48 mins
    Joanna Huisman, Lesley Charteris, Zsuzsanna Berenyi, Joe Tidy
    Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.

    The panel discussion will look at the current trends in cyber threats - from phishing, vishing and SMiShing - and the importance of employee awareness training and best practice.
  • Tech Corner with Roger Grimes and The Cyber Hub Podcast Recorded: Aug 11 2020 53 mins
    Roger Grimes (KnowBe4), James Azar (The Cyber Hub Podcast)
    In This episode we discuss data driven decision making by cybersecurity practitioners and CISO's. What is the standard of data we need in order to make the right decision in cybersecurity, what data is important and what isn't and how can we set a global standard.

    Roger Grimes is Data-Driven Defense Evangelist for KnowBe4, Inc., is a 33-year computer security consultant, instructor, holder of dozens of computer certifications, and author of 12 books and over 1,000 magazine articles on computer security. He has spoken at many of the world’s biggest computer security conferences, been in Newsweek™ magazine, appeared on television, been interviewed for NPR’s All Things Considered™, the Wall Street Journal, and been a guest on dozens of radio shows and podcasts.
  • Security Awareness: Securing the Human Layer Recorded: Jul 30 2020 59 mins
    Roger Grimes, Scott Lowe
    It’s common knowledge that humans are the leading cause of IT security incidents. Whether accidental or intentional, a human-centric root cause lies at the center of literally every security incident.

    You can’t just eliminate all the humans, so security professionals are left to find reasonable measures to ensure that the human element of their organizations can act as a bulwark of security rather than as a catalyst for disaster. This is easier said than done and requires constant vigilance.

    Human security is not a “one and done” effort. It’s an ongoing process often including automated security awareness training and simulated phishing. How do you make it happen? What steps can you take to get there? What are the real problems that need to be solved? Most importantly, do your employees really understand their critical role in protecting your organization?
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Awareness: Securing the Human Layer
  • Live at: Jul 30 2020 9:25 pm
  • Presented by: Roger Grimes, Scott Lowe
  • From:
Your email has been sent.
or close