Cybercrime has evolved rapidly, and we all need to hone our response techniques to match. Today’s adversaries are increasingly destructive and have developed effective techniques for rapidly destroying your IT infrastructure. During the aftermath of an attack, they routinely monitor the victim’s communications and may even conduct social engineering attacks based on your incident response processes. Join us and get practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.
Join Marco and LMG Security for an event on Printer Security on Thursday, June 8th at Court Avenue Brewing. We are excited to have Tom Pohl, Penetration Testing Team Manager and Senior Cybersecurity Consultant from LMG Security, demonstrate hacking.
With the growing trend of Bring Your Own Device (BYOD) to work, the risk of mobile device security breaches is increasing rapidly. In this fast-paced webinar, we’ll cover the key threats to mobile device security, common gaps in BYOD policies, and how you can protect your organization’s sensitive data on the go.
Not all security technologies are created equal! Get the inside scoop on which security controls are the most effective and what to prioritize. We’ll walk through real-world cases, discuss underlying factors and highlight solutions that really work.
Often on penetration tests we encounter printers. Lots of printers. Come watch as we demonstrate how to make your printer do things that will make your IT admins gasp in fear! Along the way, we’ll provide tips for stopping hackers at every stage.
Your organization’s security is only as strong as its weakest link – and that link could be your vendors. From Rackspace to Okta to MSP hacks and more, discover how technology vendors, software providers and other suppliers can leave you vulnerable to cyberattacks.
Ransomware has gotten sneakier. In response to highly-publicized law enforcement busts and disruptive measures, criminals have developed novel tactics such as partial encryption strategies, which are designed to speed destruction and evade detection. In this fast-paced talk, the authors of the new book, “Ransomware and Cyber Extortion,” will demonstrate the latest techniques and provide critical guidance for protecting your organization.
All hackers need is the tiniest foothold inside your network, and they can take over, stealing your most valuable data, launching ransomware attacks, and more. Watch as we demonstrate a full real-world takeover, starting with zero access from the Internet. Along the way, we’ll provide you with tips for stopping hackers at every stage.
Cybercriminals want to break into your email to steal sensitive data, conduct fraud, or reset passwords for your other accounts. In this webinar on November 9th, we’ll show you how hackers break into your email, fake invoices and wire fraud examples, how to recognize spoofed emails, and the top ways to protect your email account.
Do you hate passwords? You’re not alone. Even the best passwords can be stolen or guessed. Today, multifactor authentication (MFA) is a must—but hackers have honed techniques for bypassing common MFA tools. In this practical presentation, we’ll discuss:
• How hackers bypass authentication
• Critical MFA configuration changes that can thwart hackers
• Password managers – how hackers target them, and you can protect them
• Biometric authentication options, including facial recognition, palm prints and more
• Single-sign-on and other enterprise tools to streamline authentication
• Identity and access management
Learn how you can reduce risk and frustration in this fast-paced talk.
The world has changed—and your cybersecurity budget needs to change with it. Criminals have ramped up attacks on the supply chain and the cloud, while remote work has introduced new weaknesses. How can you maximize your ROI on cybersecurity investments in today’s new landscape? In this fast-paced webinar, we’ll highlight smart areas to prioritize for the coming year.
What are the hottest issues in cybersecurity right now? We’ll discuss new exploits and cutting-edge security research from the Black Hat 2022 and DEFCON conferences, including:* New security vulnerabilities in the 5G cellular network
Cybersecurity first responders need to react quickly to identify data breaches and minimize potential losses. Learn how to respond to malware, cloud breaches, network intrusions & more in this intensive one-day bootcamp. Bring your caffeine and be ready!
Is an attacker lurking inside your network? Have your cloud accounts been accessed without your knowledge? Cybercriminals routinely hack systems and then lurk for weeks or months, monitoring conversations, siphoning off valuable data, and eventually installing ransomware. Proper monitoring and logging can help you to detect these intrusions early on—or even prevent them from happening in the first place.
Cybercrime has evolved rapidly, and we all need to update our response techniques to match. Our webinar shares practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.