Hi [[ session.user.profile.firstName ]]

Why Hackers Hack: The Hoodie

While it’s easy to imagine a black-hat hacker as a hoodie-clad loner coding away in a dark room, this is seldom the case. Many operate in groups or even as part of larger communities or networks, and they often use the same techniques, strategies, and tools to accomplish their ends. Hackers are coordinated and work within a broad and complex network. They often have salaries, set holidays, bonus payments and sales arrangements that include reseller portals and component rental. The only prerequisite for becoming a target is simply having a website, which puts all businesses with an online presence at risk. Fortunately, threat awareness and a proactive approach to security can go a long way in keeping your business secure.

Join Kelvin Murray, Webroot Senior Threat Researcher, to learn why hackers hack and the methods they use so you can predict incoming threats, combat attacks, and securely lock down your business.

Key takeaways:
· Understand the major motivations behind why hackers hack
· Learn the strategies, tricks, and tools that hackers use to breach a business and which matter most for different business types
· Find out how to keep your business safe from becoming a target

Register Now!
Recorded Mar 18 2020 63 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kelvin Murray, Senior Threat Researcher @ Webroot
Presentation preview: Why Hackers Hack: The Hoodie

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Nastiest Malware of 2020 for SMBs Dec 15 2020 4:00 pm UTC 60 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    The year 2020 has seen one of the greatest years for malware, and we’ve analyzed the data and put together a list of the nastiest malware of 2020. This year alone, over 1.5 million new phishing sites were created every month, so it has been very busy for malware.

    Join us for a webinar with Webroot senior threat research analyst, Kelvin Murray, and learn about this year’s nastiest malware and attack vectors, and how to keep your business from falling victim to these tricky attacks with Webroot’s integrated security solutions.
  • IT Industry Outlook 2020 Dec 10 2020 3:00 pm UTC 60 mins
    Carolyn April
    CompTIA’s IT Industry Outlook 2020 provides insight into the trends shaping the industry, its workforce, and its business models. Because trends do not occur in a vacuum, the report provides context through market sizing, workforce sizing, and other references to supporting data. The interrelated nature of technology – where elements of infrastructure, software, data and services come together, means trends tend to unfold in a step-like manner. A breakthrough may lead to a notable advance, which may then be followed by what could be perceived as lateral movement as the other inputs catch-up. Some of the trends highlighted in this report focus on an early stage facet of a trend, while others recognize a trend moving beyond “buzzword” to reaching a certain stage of market-ready maturity. As such, the timing of trend impact may vary from reader to reader depending on company type, role, or country.
  • Stay Cyber aware this Christmas Dec 8 2020 4:00 pm UTC 60 mins
    Ken Thon, Security Awareness Sales Engineer @ Carbonite + Webroot, an OpenText company
    We’re all looking forward to a bit of time off for the upcoming holiday season and that can lead to complacency. Even with the increasing attacks throughout 2020 already being a threat, the holiday season can be an even more dangerous time for businesses and their employees. One accidental click on a phishing email posing as a delivery notification or transaction notice can rain havoc on your business.

    Join us for a webinar with Ken Thon, and learn about what to keep an eye out for this holiday season and how to keep your business from falling victim to phishing and other nasties with Webroot’s integrated security solutions.
  • Webroot 2020 Threat Landscape Roundup Dec 1 2020 4:00 pm UTC 60 mins
    Tyler Moffitt, Senior Threat Research Analyst @ Webroot
    SMBs were one of the major targets for cybercriminals in 2020. In 2019, two out of five SMBs have fallen victim to a ransomware attack. Register now for this 30-minute webinar on the key threats businesses faced during 2020, see what's upcoming in 2021, and get tips to help you to keep your business and clients safe.

    In the webinar, Tyler Moffit will be discussing information theft, information stealers, COVID, AI and machine learning, and all thing that made the cybercrime headlines of 2020.
  • 20:20 Security Trends– What’s changed in 2020 cybersecurity for MSPs and SMBs Nov 19 2020 4:00 pm UTC 60 mins
    George Anderson, Product Marketing Director
    The cybersecurity world has not stopped evolving because of COVID-19, if anything we’ve seen it accelerate in many quarters. This webinar takes a look back at 2020 and makes predictions about what we expect to see develop in 2021.

    Join George Anderson as he deep dives into this years top trends of the year and dissects what made them so prevalent.
  • Trends in IT Security Nov 3 2020 4:00 pm UTC 60 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    As we near the end of 2020, we’ll take a look at some of the most pressing and prevalent threat trends from another busy year in cybercrime. Join Kelvin Murray as he deep dives into this years top trends of the year and dissects what made them so prevalent.

    This webinar promises to be a sneak peek at some of the developments sure to be covered in the 2021 Webroot Threat Report, so don’t miss it!
  • Trends in Managed Services Oct 20 2020 2:00 pm UTC 60 mins
    Carolyn April
    Emerging technologies such as internet of things, AI, and drones are providing new potential revenue streams for MSPs that learn to harness those technologies. Challenges exist as well, from security threats to MSPs themselves to ongoing concerns about commoditization and margin erosion. In this session, CompTIA details findings and trends happening across the managed services landscape today.
  • IT Security: from Complacent to Critical Oct 13 2020 3:00 pm UTC 60 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    IT security for small to medium-sized businesses (SMBs) has turned from a situation where clients were complacent about IT Security to it now being a critical, high-demanded service offering.

    Kelvin Murray looks at what has driven this shift in client attitudes, and how IT security needs to rapidly evolve to give MSPs access to the expertise and security technology they need to thrive.

    Many MSPs are struggling with this new reality. This presentation will help you evaluate the IT security options open to you.
  • Smoke and Mirrors–Do AI and Machine Learning Make a Difference in Cybersecurity? Oct 6 2020 3:00 pm UTC 60 mins
    George Anderson, Product Marketing Director
    As the volume, sophistication, and complexity of cyberattacks on SMBs grows, current IT security solutions must become more pro-active, automated, and effective in response. We look at research we carried out with IT professionals worldwide and also how Webroot are using AI and ML today to get better prediction and prevention outcomes with our solutions across endpoint, security threat intelligence an DNS protection.

    Join Webroot's Director of Product Marketing, George Anderson to explore why Artificial Intelligence and Machine Learning are key for MSPs for now and the future.
  • How to Stay Disruption-Free During Hurricane Season Sep 30 2020 7:00 pm UTC 60 mins
    Webroot Sales Engineer Jody Guffey and Webroot Product Manager James Ellis
    Natural disasters are becoming more frequent and more costly. Do you have a plan for keeping systems online if a hurricane strikes your location?

    In our next webinar, “How to Stay Disruption-Free During Hurricane Season,” we’ll look at the different options for maintaining operations during a hurricane or other major outage. Topics covered will include:

    •Recent trends in natural disasters and the costs for businesses
    •What is DRaaS and how does it support business continuity
    •Differences between self-service DRaaS and fully managed

    Join us for this highly relevant webinar, considering the recent uptick in the intensity and frequency of hurricanes and other natural disasters. A brief Q & A session follows the presentation.
  • Hooked in: Staying safe from phishing while WFH Sep 29 2020 3:00 pm UTC 60 mins
    Ken Thon, Security Awareness Sales Engineer @ Carbonite + Webroot, an OpenText company
    Working from home is becoming the new normal. How can companies keep up while still managing their cybersecurity effectively? The truth of the matter is that you can invest large sums of money into security solutions such as next-generation firewalls and other protective tools, however, should one of your employees innocently click on a link that is malicious the cybercriminal can gain access to your systems. Especially now in the time that business will be adopting the hybrid model of work, it is more important that ever to keep employees trained and aware.

    Ken Thon from security experts at Webroot will take you through:

    • The Hybrid work model: What can slip through the cracks.
    • Common entry points and mistakes made by end users
    • Benefits of a cyber awareness programme
  • Stoppez les menaces avant qu’elles n’atteignent votre réseaux ou vos terminaux Sep 29 2020 8:00 am UTC 45 mins
    Jerome Bachelet, Senior Solutions Engineer Carbonite + Webroot
    Pour sécuriser avec précision les entreprises, vous avez besoin d'une approche multicouche à la sécurité des données, avec une protection au niveau du réseau et des terminaux. Rejoignez notre webinaire de 45 minutes où nous présentons nos solutions cloud de nouvelle génération pour sécuriser le réseau au niveau DNS et protéger les terminaux contre les attaques multi-vecteurs. Découvrez comment Webroot peut vous aider à être plus cyber-résilient.

    * DNS Protection
    * Endpoint Protection
    * DNS filtering controls benefits
    * Maximum security
    * Maximum privacy
    * Cyber Resilience
  • Carbonite Endpoint: Location Tracking and Remote Wipe Features Recorded: Sep 22 2020 20 mins
    Scott Bedkey, Sr. Sales Engineer @ Carbonite
    Ever wonder what the loss or theft of an employee’s device could cost your business? The answer is nearly everything. That includes:
    •The loss of intellectual property
    •A leak of customer information
    •Fines from improper care of PII
    •Revenue and reputation loss
    Luckily, there’s a way to hedge against such high stakes. With Carbonite Backup features like Location Tracking and Remote Wipe, you can easily undercut the leverage cybercriminals think they’ve got over your business. Learn more about how in the second webinar in our series on remote workers and endpoint security.
  • COVID-19 and Clicks: How Phishing Capitalized on a Global Crisis Recorded: Sep 22 2020 44 mins
    George Anderson, Product Marketing Director
    Cybercriminals are working overtime to exploit remote workforces. This webinar looks at the incidents we’ve seen so far in 2020, what our research says about phishing and what you can do to minimize the #1 threat to businesses – your own users.

    Join Webroot director of product marketing George Anderson to explore why security awareness training is becoming mandatory for organizations of all sizes. We’ll look what a well-run training program looks like, why investing in one pays off and some frightening alternatives to security-savvy users.
  • Carbonite Endpoint and Administrative Restore Recorded: Sep 15 2020 29 mins
    Scott Bedkey, Sr. Sales Engineer @ Carbonite
    See how built-in features of Carbonite + Webroot endpoint solutions empower organizations to maintain their data security and productivity with a remote workforce.
    To kick the series off, we’ll focus on the Carbonite® Endpoint solution and its Admin Restore function, including key use cases if:
    •A laptop has been lost or stolen and the user needs immediate access to specific files
    •A user has accidentally deleted an important file
    •A user has received a new laptop and needs to have all files restored
    Join us to see how native Carbonite Endpoint features help secure and streamline remote workforces.
  • Covid-19 and Cybersecurity: What has changed? Recorded: Sep 15 2020 57 mins
    Tyler Moffitt, Senior Threat Research Analyst @ Webroot
    COVID-19 is affecting cybersecurity. The pandemic has forced organisations and individuals to take unprecedented steps and embrace new practices such as remote working. We’ve seen increased spikes in phishing attacks, malspams and ransomware attacks as attackers are using COVID-19 scams to attack companies. Now business aren’t just the target as end-users who download COVID-19 related applications are also being fooled into downloading ransomware disguised as legitimate applications.

    You’re invited to join Webroot security analyst Tyler Moffitt, as he analyses the threat activity including malware, phishing, and cryptojacking that’s arisen since the rise of COVID-19 and what lies ahead in the future. Ensure your clients are resilient against this new strand of attacks by joining our webinar.
  • New and Emerging Threats: What SMBs Should Watch Out For In 2020 Recorded: Sep 9 2020 57 mins
    Tyler Moffitt, Senior Threat Research Analyst @ Webroot
    Today’s cyber threat landscape is shifting rapidly as cybercriminals take advantage of the ‘new normal’. An alarming increase in cyberattacks has exposed critical flaws in weak security systems, and more businesses are falling victim to sophisticated attacks.
    With threats worsening due to the pandemic, staying secure and knowledgeable on cybersecurity trends is vital for SMBs.
    Join Tyler Moffitt, Webroot Security Analyst to discuss the most recent threat intelligence data and what you should watch out for to keep your business safe.
    Key Takeaways:
    - Dive into the newest threats and attack methods used by cybercriminals today
    - Learn how to protect your business and your customers with a strong cyber resilience framework
    - Gain valuable insights on the current state of attacks
  • The Back to Work Security Awareness Training Webinar Recorded: Sep 8 2020 29 mins
    Ken Thon, Security Awareness Sales Engineer @ Carbonite + Webroot, an OpenText company
    Security awareness training has been around in the enterprise sector for ages, but has only recently become mainstream for SMBs. Now, with the return of many employees to the office or a hybrid model of work, security awareness is more important than ever.

    Join Webroot's Security Awareness Sales Engineer Ken Thon to see how security awareness training can benefit your business and employees.

    During this webinar, we’ll examine what a well-run security awareness training program looks like, and why you should be investing in a properly managed security training program.
  • Webroot Podcasts: Emotet: Past, Present and Future Part 3 Recorded: Sep 3 2020 9 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    In the final part of our Emotet podcast series, Kelvin Murray looks at the death and resurrection of Emotet. Learn how Emotet rose from the ashes to become even more sophisticated and difficult for admins and security alike to combat.

    Join Kelvin for a podcast discussing Emotet, tracing its beginnings from money mules in the U.S. to wannabe tiger kings, to the unprecedented technical sophistication we see today.
  • Webroot Podcasts: Emotet: Past, Present and Future Part 2 Recorded: Sep 2 2020 10 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    In part 2 of our Emotet podcast series, we look at how Emotet became the giant and notorious throughout the cyber security industry. We explore how it evolved it's spreading and delivery techniques and finally look at those who became victim to it.

    Join Kelvin for a podcast discussing Emotet, tracing its beginnings from money mules in the U.S. to wannabe tiger kings, to the unprecedented technical sophistication we see today.
Intelligent Cybersecurity
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloud-based collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world. Our award-winning SecureAnywhere® endpoint solutions and BrightCloud® Threat Intelligence Services protect tens of millions of devices across businesses, home users, and the Internet of Things. Trusted and integrated by market-leading companies, including Cisco, F5 Networks, Aruba, Palo Alto Networks, A10 Networks, and more, Webroot is headquartered in Colorado and operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity™ solutions at www.webroot.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Why Hackers Hack: The Hoodie
  • Live at: Mar 18 2020 5:00 pm
  • Presented by: Kelvin Murray, Senior Threat Researcher @ Webroot
  • From:
Your email has been sent.
or close