Register ahead of time for each month's Cybersecurity Webinar, presented live by subject matter experts, or check out archived webinars, both accessible to you free of charge.


Twelve Ways to Defeat Two-Factor Authentication

1H |  by Roger A. Grimes |  11:00 AM (CDT) / 16:00 (UTC)

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, un-hackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years’...


Active Defense: Why Duck When You Can Hit Back?

1H |  by John Wilson |  11:00 AM (CDT) / 16:00 (UTC)

Business Email Compromise scams have cost businesses more than $5B in direct monetary losses. Most organizations take a purely defensive position against these attacks, which unfortunately does nothing to increase the cost or risk to the attacker. Tempting as it may be to "hack back", US law...


Continuous Assurance Using Data Threat Modeling

1H |  by Fouad Khalil, Paul Philips, CISA, CISM, MBA |  11:00 AM (CDT) / 16:00 (UTC)

Ask most security, risk, governance or assurance practitioners what the single most important consideration for their organizations is and there’s a strong likelihood they will tell you that the answer is “the data”. Professionals continuously assess and evaluate the controls they deploy to keep...