10 Incredible Ways to Hack Email & How to Stop the Bad Guys

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. We will also share a special treat - a (pre-recorded) hacking demo by Kevin Mitnick. If all you were worried about were phishing attempts, think again!

Available:
Tue, Sep 24, 2019 10:00 AM PDT / 01:00 PM EDT
Duration:
1h 00min

When you attend this webinar, you will learn:

  • How silent malware launches, remote password hash capture, and how rogue rules work
  • Why rogue documents, establishing fake relationships and getting you to compromise your ethics are so effective
  • Details behind clickjacking and web beacons
  • Actionable steps on how to defend against them all

Featured Speakers

  • Roger Grimes
    Roger Grimes
    Data-Driven Defense Evangelist
    KnowBe4

    Roger Grimes, KnowBe4's Data-Driven Security Evangelist, is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

  • Peter Krass
    Peter Krass
    Contributing Editor
    InformationWeek

    Peter Krass is an editor and writer specializing in business technology. Formerly, Peter held senior editorial positions with Inc., Planet IT, Smart Enterprise, TechBuilder, InformationWeek and the BusinessWeek newsletter group.

Sponsored By