11 Ways to Defeat Two-Factor Authentication

Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't! Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution. The webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Accelerating Digitalization: Cyber Security

This second of TOC Digital’s ‘Accelerating Digitalization’ webinar series in association with maritime street, took place on 15th July 2020. Providing insights from an expert panel including Gadi Bensmonshe, CIO of Israel Port Company, Dr. Carmit Yadin, CEO & Co-Founder of Arcusteam, Roi Mit, Chief Marketing Officer of Regulus Cyber and Pascal Ollivier, President of maritime street, viewers learned the various implications to consider when formulating a comprehensive strategy to reduce immediate cyber threats, and what the overall picture looked like for the wider industry.
Watch Now

How to Remove Complexity as a Threat to Security

Cyxtera

No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office alongside Jason Garbis and Ian Breeze of Cyxtera, as we address the mounting complexity security professionals face today. Access the webinar replay to hear recommendations for removing unnecessary complexity that threatens your cyber resiliency.
Watch Now

Mapping Your Ransomware Preparedness Strategy for 2023

As 2022 comes to a close, ransomware remains a significant discussion in boardrooms around the world. As we enter 2023, it’s increasingly obvious that people’s daily lives continue to become ever more inextricably intertwined with technology, increasing the potential reward for thieves participating in ransomware attacks.
Watch Now

Threat Detection for Common MITRE ATT&CK Techniques

LogRhythm

If you’re ready to take a deep dive into applying the MITRE ATT&CK framework and learning how to use it in your environment, then this webinar is for you. In this on-demand webinar, LogRhythm threat research engineers join Ultimate Security Windows Host Randy Franklin Smith to zero in on the new standard to assess the effectiveness of your security monitoring and alerting capabilities — the MITRE ATT&CK framework.
Watch Now