|
||
Registration for this event is open from: | Feb 27, 2019 12:00 - Oct 23, 2019 12:00 | |
Where: | Webinar, Recorded, Both Live/Recorded, (US). | |
Date: | Apr 23, 2019 - Apr 23, 2019 | |
Time: | 02:00 - 03:30 | |
Event description: | ||
Hacking the Weakest Link:The Role of Staff in Maintaining IT SecurityWebinar OR Recorded Webinar + Free Digital Download Tuesday, April 23, 2019 12:00 pm – 1:30 pm Pacific 1:00 pm – 2:30 pm Mountain 2:00 pm – 3:30 pm Central 3:00 pm – 4:30 pm Eastern Today’s environment requires everyone to take more responsibility for protecting personal and employer digital assets from the various, never-ending digital attacks. Everyone benefits when individuals understand hackers’ primary methods, how to mitigate threats, and how to avoid being the weakest link. This webinar will be a fresh look at hacking the weakest link – people duped by social engineering. Social engineering is commonly seen in phishing emails, fraudulent phone calls, and other confidence schemes. It is the easiest and most common method used by malicious attackers to gain unauthorized access to systems, resources, and data. Learn common real-world tricks and techniques that work and how to lower your risk. Get the latest tactics, tools, and techniques straight from an expert “white hat” hacker. HIGHLIGHTS
WHO SHOULD ATTEND? This informative session is best suited for employees, management, and leadership seeking current information, tactics, and tools to ensure a safer cyber security environment. Anyone who has digital information worth protecting and the willingness to protect it will benefit. A technical background is not necessary for this course. DON’T MISS THESE RELATED WEBINARS! Teller Training Series: Frontline Fraud Prevention: Stopping Fraud at the Teller Line on Wednesday, January 30, 2019 & Synthetic ID Fraud: What It Is, How It Works & Real-Life Scenarios on Monday, March 11, 2019 & Mitigating a Data Breach: Forensics & Incident Response on Wednesday, September 18, 2019 Attendance verification for CE credits provided upon request. Please note: The live webinar option allows you to have one internet connection (from a single computer terminal). You may have as many people as you like listen and watch from your office computer. ABOUT THE PRESENTER – Brian Self, Brian Self Consulting Brian Self is a Certified Information Systems Security Professional (CISSP), ethical hacker, and professional speaker. He has been in information security for over 15 years and in IT for over 20. He has been a professional penetration tester (offensive security), security engineer, compliance subject matter expert (SME), IT security architect, and consultant in a variety of security domains. THREE REGISTRATION OPTIONS Note: All materials are subject to copyright. Transmission, retransmission, or republishing this webinar to other institutions or those not employed by your financial institution is prohibited. Print materials may be copied for eligible participants only.
The live webinar option allows you to have one internet connection from a single computer terminal. You may have as many people as you like listen and watch from your office computer. Registrants receive a website address and passcode that allows entrance to the seminar. The session will be approximately 90 minutes, including question and answer sessions. Seminar materials, including instructions, passcode, and handouts will be emailed prior to the broadcast. You will need the most current version of Adobe Reader available free at www.adobe.com.
Can’t attend the live webinar? This option provides a recording of the live event, including audio, visuals, and handouts. We even provide the presenter’s email address for follow-up questions. You will receive an email with the recorded webinar link, which can be viewed anytime 24/7, beginning 6 business days after the webinar. You will also receive instruction on how to download a free digital copy of the webinar to your PC, which you may keep and use indefinitely. The recorded webinar may ONLY be ordered for 6 months following the live webinar. In addition, the download must be completed within 6 months of the live webinar date.
Options 1 and 2 described above. AFFORDABLE, PROFESSIONAL TRAINING, WHEN AND WHERE YOU CHOOSE |