Cybercriminals exploit software vulnerabilities in your Internet-facing systems, send phishing emails to staff, or target your cloud infrastructure. Come and watch as Matt Durrin and Tom Pohl show you how to identify your attack surface, and provide critical tips on how to reduce your risk.
Cybercriminals are taking hacking to the next level by leveraging ever more sophisticated toolsets and rapidly evolving techniques. Join us to hear cybersecurity experts Sherri Davidoff and Matt Durrin share the biggest cybersecurity threats and most concerning criminal tactics for 2024 and how you can protect your organization.
Do you hate passwords? You’re not alone. Billions of stolen passwords are available on the dark web, and hackers now routinely sell tools to bypass multifactor authentication (MFA). To combat this, major technology providers including Microsoft, Google, and Apple are rolling out passwordless solutions. Join us as we talk about how to effectively migrate to new solutions and provide tips on future-proofing your critical technologies.
Find your weaknesses before the hackers do! In order to effectively defend your IT infrastructure, you need to explore your network in the same way as hackers. This practical, hands-on class will teach you to do just that: pentest your own network. Along the way, we’ll cover detailed remediation tips and test out various techniques for stopping attackers and ensuring that your changes work. Learn to hack your own network—and fix the issues—in this practical penetration testing class for IT professionals.
All hackers need is the tiniest foothold inside your network, and they can take over, stealing your most valuable data, launching ransomware attacks, and more. Watch as we demonstrate a full real-world takeover, starting with zero access from the Internet. Learn how to thwart hackers with simple configuration changes and strong auditing techniques.
Hackers exploit human vulnerabilities in order to divert funds, break into your cloud, install malware and more. Watch the latest attack trends and techniques in this fast-paced webinar.
Criminals are targeting cloud apps and infrastructure, stealing loads of sensitive information and holding companies hostage. How do attackers break in, and what exactly do they do with access when they have it? In this fast-paced talk, we’ll show you how hackers:
- Hijack API keys and Break into your cloud infrastructure
- Exploit common misconfigurations to scrape data and compromise applications
- Spread from on-prem to the cloud (and vice versa)
- Lurk in your systems to steal data, hijack payments, and more
- Hold your cloud data hostage unless you pay a ransom
Along the way, we’ll also show you tips and tricks on securing your cloud infrastructure and locking hackers out before they get their hands on your goldmine of data.
What are the hottest issues in cybersecurity right now? We’ll discuss new exploits and cutting-edge security research from the 2023 Black Hat and DEFCON conferences in this fast-paced webinar. We’ll also share the conference highlights, what they mean for you, and what your organization can do to defend itself against an increasingly complex and dangerous digital landscape.
What makes the dark web so dark? Join us for a deep dive into the inner workings of the darkest corners of the internet. Come along for a guided tour of the criminal underground and see first-hand how hackers and criminals use the anonymity of the dark web to sell their goods and hide their crimes. We’ll also cover how the dark web can be used for good by enabling spies, journalists, and others to protect their privacy. Finally, we’ll discuss how the dark web and the underground economy it provides are directly related to the latest cyber threats, enabling hackers to buy malware, 0-day exploits, and much more.
Cybercrime has evolved rapidly, and we all need to hone our response techniques to match. Today’s adversaries are increasingly destructive and have developed effective techniques for rapidly destroying your IT infrastructure. During the aftermath of an attack, they routinely monitor the victim’s communications and may even conduct social engineering attacks based on your incident response processes. Join us and get practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.
Join Marco and LMG Security for an event on Printer Security on Thursday, June 8th at Court Avenue Brewing. We are excited to have Tom Pohl, Penetration Testing Team Manager and Senior Cybersecurity Consultant from LMG Security, demonstrate hacking.
With the growing trend of Bring Your Own Device (BYOD) to work, the risk of mobile device security breaches is increasing rapidly. In this fast-paced webinar, we’ll cover the key threats to mobile device security, common gaps in BYOD policies, and how you can protect your organization’s sensitive data on the go.
Not all security technologies are created equal! Get the inside scoop on which security controls are the most effective and what to prioritize. We’ll walk through real-world cases, discuss underlying factors and highlight solutions that really work.
Often on penetration tests we encounter printers. Lots of printers. Come watch as we demonstrate how to make your printer do things that will make your IT admins gasp in fear! Along the way, we’ll provide tips for stopping hackers at every stage.
Your organization’s security is only as strong as its weakest link – and that link could be your vendors. From Rackspace to Okta to MSP hacks and more, discover how technology vendors, software providers and other suppliers can leave you vulnerable to cyberattacks.