Often on penetration tests we encounter printers. Lots of printers. Come watch as we demonstrate how to make your printer do things that will make your IT admins gasp in fear! Along the way, we’ll provide tips for stopping hackers at every stage.
Your organization’s security is only as strong as its weakest link – and that link could be your vendors. From Rackspace to Okta to MSP hacks and more, discover how technology vendors, software providers and other suppliers can leave you vulnerable to cyberattacks.
Ransomware has gotten sneakier. In response to highly-publicized law enforcement busts and disruptive measures, criminals have developed novel tactics such as partial encryption strategies, which are designed to speed destruction and evade detection. In this fast-paced talk, the authors of the new book, “Ransomware and Cyber Extortion,” will demonstrate the latest techniques and provide critical guidance for protecting your organization.
All hackers need is the tiniest foothold inside your network, and they can take over, stealing your most valuable data, launching ransomware attacks, and more. Watch as we demonstrate a full real-world takeover, starting with zero access from the Internet. Along the way, we’ll provide you with tips for stopping hackers at every stage.
Cybercriminals want to break into your email to steal sensitive data, conduct fraud, or reset passwords for your other accounts. In this webinar on November 9th, we’ll show you how hackers break into your email, fake invoices and wire fraud examples, how to recognize spoofed emails, and the top ways to protect your email account.
Do you hate passwords? You’re not alone. Even the best passwords can be stolen or guessed. Today, multifactor authentication (MFA) is a must—but hackers have honed techniques for bypassing common MFA tools. In this practical presentation, we’ll discuss:
• How hackers bypass authentication
• Critical MFA configuration changes that can thwart hackers
• Password managers – how hackers target them, and you can protect them
• Biometric authentication options, including facial recognition, palm prints and more
• Single-sign-on and other enterprise tools to streamline authentication
• Identity and access management
Learn how you can reduce risk and frustration in this fast-paced talk.
The world has changed—and your cybersecurity budget needs to change with it. Criminals have ramped up attacks on the supply chain and the cloud, while remote work has introduced new weaknesses. How can you maximize your ROI on cybersecurity investments in today’s new landscape? In this fast-paced webinar, we’ll highlight smart areas to prioritize for the coming year.
What are the hottest issues in cybersecurity right now? We’ll discuss new exploits and cutting-edge security research from the Black Hat 2022 and DEFCON conferences, including:* New security vulnerabilities in the 5G cellular network
Cybersecurity first responders need to react quickly to identify data breaches and minimize potential losses. Learn how to respond to malware, cloud breaches, network intrusions & more in this intensive one-day bootcamp. Bring your caffeine and be ready!
Is an attacker lurking inside your network? Have your cloud accounts been accessed without your knowledge? Cybercriminals routinely hack systems and then lurk for weeks or months, monitoring conversations, siphoning off valuable data, and eventually installing ransomware. Proper monitoring and logging can help you to detect these intrusions early on—or even prevent them from happening in the first place.
Cybercrime has evolved rapidly, and we all need to update our response techniques to match. Our webinar shares practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.
Join us for a series of step-by-step workshops that demonstrate how to deploy multifactor authentication (MFA) for popular services, including Microsoft 365 and G-Suite. In addition, we’ll show you how to set up Duo for an all-encompassing MFA solution that supports SSO and has advanced management capabilities.
Cybersecurity was the top spending priority for CIOs in 2021, according to Gartner. Not all spending is equally effective, however. In this fast-paced talk, we’ll step through the key elements of a highly successful cybersecurity program.
Ransomware is an epidemic. In the blink of an eye, everything from your financial records to emails to file shares have been encrypted, possibly never to be seen again. This is the nightmare that organizations around the world have faced, as they grapple with the most destructive and terrifying of all cyberattacks. Our ransomware training class shows you how to quickly respond and minimize losses.