Critical Insight invites you to their event

Unmasking the Tactics of Cybercriminals Targeting Your Business

About this event

Over 43% of cyberattacks target small businesses, and of those, 60% will close within six months of being breached due to the financial and reputational damage caused. - Verizon Business

In the evolving landscape of cybersecurity threats, businesses of all sizes are increasingly vulnerable to sophisticated attacks. This webinar dives deep into the most pressing security challenges: credential stuffing, MFA bypass, phishing, and more. 

Our panel of cybersecurity experts will shed light on how these attacks operate, the common mistakes businesses make, and the strategies you can employ to protect your organization. 

Whether you're a small business or part of our country’s critical infrastructure, understanding these threats is crucial to safeguarding your digital assets and maintaining trust with your customers and citizens.

Topics:

  • The Anatomy of Credential Stuffing Attacks: An in-depth look at how cybercriminals use automated tools to breach accounts by exploiting weak or reused passwords. Experts will discuss the signs of an attack and proactive measures to prevent them.
  • MFA Bypass: We'll explore the methods hackers use to bypass MFA, such as phishing for authentication codes or exploiting software vulnerabilities. This topic will cover how to strengthen MFA implementations and what additional layers of security can be added.
  • Phishing as The Gateway to Cybercrime: A comprehensive analysis of phishing techniques, from basic email scams to sophisticated spear-phishing campaigns. Learn about the psychological manipulation tactics used and how businesses can train employees to recognize and respond to phishing attempts.
  • Zero Trust Architecture: An introduction to Zero Trust principles and how they can protect against infiltration tactics. Experts will discuss implementing this architecture in various business environments to minimize the risk of unauthorized access.
  • Case Studies of Recent Cyber Attacks and Our Lessons Learned: Review real-world examples of businesses that have fallen victim to credential stuffing, MFA bypass, and phishing attacks. This topic will highlight what went wrong and the lessons that can be learned to prevent similar breaches in the future.

Join us on September 10 at 12pm PT/ 3pm ET.

Hosted by

  • Team member
    T
    Michael Hamilton Founder @ Critical Insight, Inc

    Thirty years in information security in every imaginable role.

  • Team member
    T
    Fred Langston Chief Product Officer @ Critical Insight, Inc.

    Fred Langston CISSP, CCSK, a cofounder of Critical Insight, Inc., has over 25 years of information security experience. He participated in the working group that contributed to the proposed HIPAA security rule as well as the SIG and the AUP working group for the Banking IT Security Forum.

  • Team member
    T
    Brad Swanson vCISO, Principal Consultant @ Critical Insight

    Security PRofessional with almost 30 years experience. Specializing in helping SMBs in the critical services sector address their security needs. In my spare time I drive around mountains in my Jeep.

Critical Insight

Cybersecurity-as-a-Service

Defending your organization with a personalized blend of managed and professional services, to assess, test and monitor 24x7. Critical Insight.