Hi [[ session.user.profile.firstName ]]

Mitigating Ransomware in 2021 - A Q&A Webinar with Roger Grimes

There’s no shortage of frightening ransomware statistics and news reports to scare the pants off of you, but what is in short supply is practical advice from experts on exactly what you need to know to prevent ransomware BEFORE it affects your network.

This is your chance to get your ransomware questions answered so that you can PREVENT ransomware from compromising your organization in 2021. Join us for this webinar with security author, speaker, and expert - Roger Grimes, Security Awareness Advocate at KnowBe4 - who answers attendees burning questions!
Recorded Jan 25 2021 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roger Grimes (KnowBe4), David Davis (ActualTech Media)
Presentation preview: Mitigating Ransomware in 2021 - A Q&A Webinar with Roger Grimes

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Art of Invisibility featuring Kevin Mitnick and Perry Carptenter Recorded: May 11 2021 65 mins
    Kevin Mitnick, Perry Carpenter
    Corporate privacy concerns are more paramount right now than ever before. Organizations are being forced to maneuver a new world of security and privacy issues related to a remote workforce, evolving hardware/software needs, and employee access policies. Kevin Mitnick knows this world well. In fact, that's the topic of his book, The Art of Invisibility.

    Join us for this exclusive webinar as Kevin Mitnick, KnowBe4's Chief Hacking Officer, and Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer, enter into an eye-opening discussion of the expected and unexpected risks this workforce evolution brings.

    They will discuss topics including:

    - Privacy concerns around employees using personal devices for business purposes
    - Security issues with various operating systems, mobile devices, and the Internet of Things
    - The reality of "deep privacy" and how tied together devices, systems, and surveillance really are
    - Shocking new demonstrations that will change the way you think about privacy
    - Why new-school security awareness training is more critical than ever before
  • 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys Recorded: May 10 2021 68 mins
    Roger Grimes
    Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as he joins for this webinar where he will explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, he'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.

    Roger will teach you:

    •How silent malware launches, remote password hash capture, and how rogue rules work
    •Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
    •Details behind clickjacking and web beacons
    •Actionable steps on how to defend against them all

    If all you were worried about were phishing attempts, think again!
  • Ransomware Hostage Rescue Manual Recorded: May 5 2021 61 mins
    Erich Kron
    Ransomware attacks are on the rise — and they’re estimated to cost global organizations $20 billion by 2021 with government agencies, healthcare providers, and educational institutions in the U.S. impacted by ransomware attacks at a cost of more than $7.5 billion in 2019 alone. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks.

    So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware.

    In this webcast we will cover:
    · What new scary ransomware strains are in the wild
    · Am I infected?
    · I’m infected, now what?
    · Proven methods of protecting your organization?
    · How to create a “human firewall”

    Don’t get held hostage and become a statistic! Join us to learn how to avoid these scary attacks.
  • A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation Recorded: May 4 2021 61 mins
    Roger Grimes (KnowBe4), Tom Bechtold (SecureWorld)
    Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

    With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against quickly-evolving IT security threats like ransomware.

    Join Roger and Tom Bechtold of SecureWorld for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.

    In this session you’ll learn:

    - How to detect ransomware programs, even those that are highly stealthy
    - Official recommendations from the Cybersecurity & Infrastructure Security Agency (CISA)
    - The policies, technical controls, and education you need to stop ransomware in its tracks
    - Why good backups (even offline backups) no longer save you from ransomware

    You can learn how to identify and stop these attacks before they wreak havoc on your network.
  • The Pesky Password Problem: Policies That Help You Gain the Upper Hand Recorded: May 3 2021 63 mins
    Roger Grimes
    What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?

    For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries’ inability to engineer secure systems. Password complexity, length, and rotation requirements are the bane of your end-user experience and literally the cause of thousands of data breaches. But it doesn't have to be that way!

    Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, to find out what your password policy should be and learn about the common mistakes organizations make when creating password policy.

    In this webinar you'll learn:

    - Why passwords are so easy to hack and how the bad guys do it
    - How to craft a secure, risk-focused password security policy
    - The truth about password managers and multi-factor authentication and how they impact your risk
    - How to empower your end users to become your best last line of defense
  • Stay Out of the Net: Your Ultimate Guide to Phishing Mitigation Recorded: Apr 28 2021 64 mins
    Roger Grimes (KnowBe4), Gary Miliefsky (Cyber Defense Media Group)
    Spear phishing emails remain the most popular attack avenue for the bad guys, yet most companies still don’t have an effective strategy to stop them. This enormous security gap leaves you open to business email compromise, session hijacking, ransomware and more. Don’t get caught in a phishing net! Learn how to avoid having your end users take the bait.

    This webinar, hosted by Cyber Defense Media group with Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will cover a number of techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. We won’t just cover one angle. We’ll come at it from all angles!

    Strategies include:

    · Developing a comprehensive, defense-in-depth plan
    · Technical controls all organizations should consider
    · Gotchas to watch out for with cybersecurity insurance
    · Benefits of implementing new-school security awareness training
    · Best practices for creating and implementing security policies
  • Malicious Browser Notifications: The Phishing Attack Not Blocked by Defenses Recorded: Apr 27 2021 63 mins
    Roger Grimes (KnowBe4), Tom Bechtold (SecureWorld)
    Cybercriminals have added a devious weapon to their attack arsenals - malicious browser notifications. And the worst part is they’re not blocked by any current cyber defense. These innocuous looking pop ups can wreak havoc on your network while remaining completely undetected. They look more realistic than traditional phishing methods and are designed to trick your unsuspecting users. This is just the latest in a list of sneaky browser attacks the bad guys use to infiltrate your network.

    Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist to find out what you need to know now about malicious browser attacks and how to stop them.

    Attend this session to learn:

    - How legitimate websites are targeted to deliver these stealthy phishing attacks
    - Why browser notification phishing attacks bypass your cyber defenses
    - Other sneaky browser attacks the bad guys use to infiltrate your network
    - How to shore up your defenses and to protect against them all
  • A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation Recorded: Apr 27 2021 61 mins
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.

    With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against quickly-evolving IT security threats like ransomware.

    Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.

    In this session you’ll learn:

    - How to detect ransomware programs, even those that are highly stealthy
    - Official recommendations from the Cybersecurity & Infrastructure Security Agency (CISA)
    - The policies, technical controls, and education you need to stop ransomware in its tracks
    - Why good backups (even offline backups) no longer save you from ransomware

    You can learn how to identify and stop these attacks before they wreak havoc on your network.
  • When the Bad Guys Hide in Plain Sight: Hacking Platforms You Know and Trust Recorded: Apr 26 2021 68 mins
    Kevin Mitnick, Perry Carpenter
    Today’s hackers are concealing their attacks in places you wouldn’t expect… utilizing tools your users know and trust to deliver their malicious payloads. Secure email services with end-to-end encryption and cloud storage solutions like Google Drive just aren’t as trustworthy as your end users believe.

    In this exclusive webinar Kevin Mitnick, KnowBe4’s Chief Hacking Officer and Perry Carpenter, KnowBe4’s Chief Evangelist & Strategy Officer will show you why your users should think twice before trusting seemingly benign emails.

    In this session we’ll share:

    - Why you shouldn’t always trust legitimate providers like Google Drive
    - How hackers use safe email senders to bypass email security tools
    - The dangers of storing passwords in your browser
    - Actual phishing attacks we’re seeing in the wild
    - Eye-opening hacking demos you won't want to miss

    See the dangers lurking behind seemingly innocent actions for yourself. 
  • Lower Your Business Risk with Best Practice Data Privacy Impact Assessments Recorded: Apr 26 2021 45 mins
    Lecio DePaula Jr.
    Whether you're creating a new product, going through a merger & acquisitions, or significantly changing a process in your organization, new processing activities can present high risk to your organization. As we can see from Marriott’s acquisition of Starwood, not undergoing a full security and privacy assessment can present huge problems for your organization and now Marriott faces a $123.6 million dollar fine due to lack of due diligence.

    One way to reduce risks and identify security/privacy risk is to conduct a data protection impact assessment. Not only will this assessment help you reduce business risk, but it also helps identify new processes in your organization to maintain compliance with GDPR, LGPD, CCPA and other global privacy laws.

    Join Lecio DePaula Jr., KnowBe4’s Data Privacy Director, for this webinar to hear about creating a robust data protection impact assessment to analyze new processes, workflows, and products to identify problems before they happen.

    In this webinar you’ll learn:

    - Best practices for conducting a robust DPIA
    - The privacy and security risks of M&A, creating new software products, other initiatives
    - How conducting a DPIA aligns with global privacy requirements
    - Common DPIA mistakes and how to avoid them
    - Tools that help manage and streamline your DPIA process
  • The Pesky Password Problem Recorded: Apr 21 2021 54 mins
    Javvad Malik
    Passwords. They are the bane of end-users and security alike. Complexity, length and rotation requirements make modern passwords hard to remember and lead to the most basic of breaches: when the password is found on a sticky note.

    Are these requirements a result of the IT industry’s inability to design secure systems? What is the alternative? What makes a ‘strong’ password, and what does the ever-increasing power of high-end hacking tools mean for the password in the future?

    Join Computing and KnowBe4 as we discuss the importance (or not) of a password policy, what that policy should be and talk about the common mistakes organisations make when looking at passwords.

    In this webinar you'll learn:

    - Why passwords are so easy to hack, and how the bad guys do it
    - How to craft a secure, risk-focused password security policy
    - The truth about password managers and multi-factor authentication and how they impact our risk
    - How to empower your end users to become your best last line of defence
  • The Many Ways to Hack Multi-Factor Authentication Recorded: Apr 21 2021 62 mins
    Roger Grimes
    Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

    Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, a security expert with over 30-years experience, and David Littman of TruthInIT for this video webinar where they will explore 12 ways hackers can and do get around your favorite MFA solution.

    The on-demand webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

    You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

    - 12 ways hackers get around multi-factor authentication
    - How to defend your multi-factor authentication solution
    - The role humans play in a blended-defense strategy
  • Hacking Multifactor Authentication: Lessons Learned After Testing 150 Products Recorded: Apr 12 2021 60 mins
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    Multifactor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking Multifactor Authentication, Roger tested over 150 MFA solutions. And he wants to share what he learned with you!

    Join Roger as he discusses the good, the bad, and the ugly lessons he learned from his research. He’ll share with you what works, what doesn’t, and what you should absolutely avoid.

    In this webinar you’ll learn about:

    - Differences between various MFA tools and why they matter
    - Real-world hacking techniques Roger used to expose MFA weaknesses
    - What makes MFA software weak or strong and what that means to you
    - Tips on choosing the best MFA software for your company
    - Why a strong human firewall is your best last line of defense

    Get the details you need to know to become a better IT security defender.
  • A Master Class on IT Security: Roger Grimes Teaches Ransomware Mitigation Recorded: Apr 7 2021 72 mins
    Roger Grimes (KnowBe4), Tom Bechtold (SecureWorld)
    Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization’s potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4. 

    With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you’re prepared to defend against quickly-evolving IT security threats like ransomware.

    Join Roger and SecureWorld for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.

    In this session you’ll learn:

    - How to detect ransomware programs, even those that are highly stealthy 
    - Official recommendations from the Cybersecurity & Infrastructure Security Agency (CISA)
    - The policies, technical controls, and education you need to stop ransomware in its tracks
    - Why good backups (even offline backups) no longer save you from ransomware

    You can learn how to identify and stop these attacks before they wreak havoc on your network.
  • Nation-State Hacking 2.0: Why Your Organization is Now at Risk Recorded: Apr 7 2021 61 mins
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    Security professionals have worried about cyber warfare for decades. But the attack on Sony Pictures, the Solarwinds supply chain compromise, and now the latest Microsoft Exchange zero-day exploits show that nation-state attacks are having a much bigger impact than ever before.

    Don’t let the big names fool you. Today, any organization is fair game, which means your organization could be next.

    Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist to find out how these attacks are evolving and why organizations like yours are their new target.

    In this webinar you’ll learn:

    - The history of nation-state attacks and how they’re changing
    - Why these attacks now impact organizations of all sizes and industries
    - How you can mitigate the threat of nation-state attacks
    - Why it’s critical to empower your organization’s human firewall 

    You did not sign up for this, but the digital cold war is here.
  • Addressing the Challenge of Third-Party Vendor Risk: Securing Your Supply Chain Recorded: Apr 7 2021 59 mins
    James McQuiggan
    Your customer data, intellectual property, and financials are the lifeblood of your organization. If lost or leaked, there could be significant implications to the viability of your business. Maintaining control of that data, especially with third-party services, can be extremely challenging and requires that you ask the right questions and enforce stringent security policies.

    In an environment of increased outsourcing, cloud computing adoption, and regulatory requirements, how do you manage vendor risk and ensure you have a consistent evaluation life cycle

    Join James McQuiggan, KnowBe4's Security Awareness Advocate, to get actionable steps you can use now to better manage your third-party vendor risk. You'll learn:

    - The importance of securing your organization's critical data
    - How to determine Supplier Security Proficiency
    - Why it’s important to understand the source of third-party products
    - The impact Vendor Questionnaires have on your Security Posture
    - How leveraging a GRC platform can ease the burden of risk assessments and audits
  • The Microsoft Exchange Mass Hack Is a Huge Security Risk for All Organizations Recorded: Apr 1 2021 28 mins
    Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
    On March 2, Microsoft released emergency security updates to plug multiple zero-day security holes in Exchange Server versions 2013 through 2019 that hackers were actively using to siphon email and compromise environments.

    Literally hundreds of thousands of organizations globally have been affected by this Exchange mass hack and now may be victims compromised by multiple cybercrime groups. Whether your organization is running Exchange itself or receives emails from organizations using Exchange servers, the risk has just skyrocketed.

    Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist has created a special security alert webinar to share critical insights about the Microsoft Exchange attack and what you can do about it.

    Watch it now to learn:
    - Details about the hack and and defense strategies
    - What makes this so different from other mass attacks
    - Why “trusted third-party phishing” makes your organization a target whether you run Exchange or not
    - What you need to do now to protect your organization
  • Malicious Browser Notifications: Attacks Not Blocked by Your Cyber Defense Recorded: Mar 19 2021 58 mins
    Roger Grimes (KnowBe4), David Littman (TruthInIT)
    Cybercriminals have added a devious weapon to their attack arsenals - malicious browser notifications. And the worst part is they’re not blocked by any current cyber defense. These innocuous looking pop ups can wreak havoc on your network while remaining completely undetected. They look more realistic than traditional phishing methods and are designed to trick your unsuspecting users. This is just the latest in a list of sneaky browser attacks the bad guys use to infiltrate your network.

    Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist to find out what you need to know now about malicious browser attacks and how to stop them.

    Attend this session to learn:

    - How legitimate websites are targeted to deliver these stealthy phishing attacks
    - Why browser notification phishing attacks bypass your cyber defenses
    - Other sneaky browser attacks the bad guys use to infiltrate your network
    - How to shore up your defenses and to protect against them all
  • Avoiding Business Email Compromise Phishing Scams During Tax Season Recorded: Mar 9 2021 52 mins
    Erich Kron, Security Awareness Advocate (KnowBe4)
    Taxes are unavoidable, and unfortunately, so are the annual tax-related phishing scams. This year, with the COVID-19 pandemic continuing to keep people working from home, cybercriminals have all they need to cause serious disruptions to your organization. From traditional Business Email Compromise (BEC) scams to W2 scams the bad guys are going to be very busy, but we can help you navigate these challenges and keep your organization secure.

    Join us for this webinar with Erich Kron, Security Awareness Advocate at KnowBe4, to understand how these attacks work, why they are so effective and why the pandemic will make them even more potent than usual.

    This webinar will discuss:

    - The methodology behind BEC and tax scams
    - The psychology behind the attacks and why they work
    - How these attacks are carried out and why COVID-19 makes them scarier than ever
    - Defensive strategies and the tricks you can use for making them most effective
    - How to defend your organization by strengthening your human firewall
  • The Critical Need to Improve Your Compliance Processes Recorded: Mar 3 2021 58 mins
    Erich Kron
    You know that compliance is an important requirement but can also be time-consuming and fraught with risk. Still, most organizations have not implemented the processes and tools necessary to manage the compliance process efficiently. The often-tedious processes related to compliance don’t have to be a burden or a risk. Your security and compliance can be aligned and made more efficient by reducing or eliminating redundant steps and using the right tools.

    Join Erich Kron, Technical Evangelist at KnowBe4, to learn how you can streamline your processes to effectively demonstrate compliance and save so much time.

    In this webinar we will discuss:

    - Common challenges organizations face regarding compliance
    - The dangerous impact non-compliance can have on your organization
    - Differences between organizational and departmental compliance
    - Find out how to streamline your audit processes, assign tasks, and organize evidence in a way that will save you tons of time.
Security Awareness Training
KnowBe4 is the world’s most popular integrated Security Awareness Training and Simulated Phishing platform. Realizing that the human element of security was being seriously neglected, KnowBe4 was created to help organizations manage the problem of social engineering, spear phishing, and ransomware attacks, through a comprehensive new-school awareness training approach. KnowBe4 trains employees to make smarter security decisions.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mitigating Ransomware in 2021 - A Q&A Webinar with Roger Grimes
  • Live at: Jan 25 2021 8:15 pm
  • Presented by: Roger Grimes (KnowBe4), David Davis (ActualTech Media)
  • From:
Your email has been sent.
or close