www.truthinit.com Open in urlscan Pro
185.4.176.139  Public Scan

Submitted URL: http://url3925.truebitwebinars.com/ls/click?upn=bMjJpLr9SG4rtkc0HVLABqjs-2F47RXUGttPVtavpvuendKKIiy0GR3nzfWnYUXh35hSnexe1fDFmhdJDET...
Effective URL: https://www.truthinit.com/index.php/channel/533/
Submission Tags: falconsandbox
Submission: On January 23 via api from US — Scanned from DE

Form analysis 5 forms found in the DOM

Name: miniSearchFormGET

<form id="miniSearchForm" name="miniSearchForm" class="miniSearchForm" action="" method="get" data-cb-wrapper="true">
  <a href="#" class="searchButton" title="Search"><i class="icon-search"></i></a>
  <input name="miniSearchField" id="miniSearchField" class="miniSearchField" value="" title="Search">
</form>

Name: searchFormDirectSearchGET https://www.truthinit.com/index.php/portal/search/

<form id="searchFormDirectSearch" name="searchFormDirectSearch" class="searchFormDirectSearch" action="https://www.truthinit.com/index.php/portal/search/" method="get" data-cb-wrapper="true">
  <a href="#" id="directHeaderSearchButtom" class="directHeaderSearchButtom" title="Search" onclick="$('#searchFormDirectSearch').submit(); return false; "><i class="icon-search"></i></a>
  <input name="iq" id="iqDS" type="text" class="directHeaderSearchField" value="" placeholder="Search on titles, descriptions, within captions" tabindex="-1">
  <input name="go" id="goDS" type="hidden" value="portal">
  <input name="do" id="doDS" type="hidden" value="search">
  <input name="searchFormGUI" id="searchFormGUIDS" type="hidden" value="desktop">
  <input name="searchFormFUrlStyle" id="searchFormFUrlStyleDS" type="hidden" value="default">
  <input name="searchFormBaseUrl" id="searchFormBaseUrlDS" type="hidden" value="https://www.truthinit.com/">
</form>

Name: searchFormGET https://www.truthinit.com/index.php/portal/search/

<form id="searchForm" name="searchForm" class="searchForm" action="https://www.truthinit.com/index.php/portal/search/" method="get" data-cb-wrapper="true">
  <a href="#" class="searchButton" title="Search"><i class="icon-search"></i></a>
  <input name="iq" id="searchField" class="searchField" value="" title="Search" tabindex="-1">
  <input name="go" id="go" type="hidden" value="portal">
  <input name="do" id="do" type="hidden" value="search">
  <input name="searchFormGUI" id="searchFormGUI" type="hidden" value="desktop">
  <input name="searchFormFUrlStyle" id="searchFormFUrlStyle" type="hidden" value="default">
  <input name="searchFormBaseUrl" id="searchFormBaseUrl" type="hidden" value="https://www.truthinit.com/">
</form>

Name: clip_data_form

<form name="clip_data_form" data-cb-wrapper="true">
  <input type="hidden" name="form_clip_data_id" id="form_clip_data_id" value="3308">
  <input type="hidden" name="form_clip_data_title" id="form_clip_data_title" value="Hacking The Hacker: Assessing &amp; Addressing Your Organization's Cyber-Defenses">
</form>

Name: channel_data_form

<form name="channel_data_form" data-cb-wrapper="true">
  <input type="hidden" name="form_channel_data_id" id="form_channel_data_id" value="533">
  <textarea style="display:none;" name="form_channel_data_title" id="form_channel_data_title">Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses</textarea>
</form>

Text Content

Ongoing events
 * * AARON
   * Administration
   * Favorited videos
   * Liked videos
   * Watched videos
   * Log Out


 * * 


 * Data Management
   * Networking
   * The Edge
   * Virtualization
   * Converged Infrastructure
 * Data Security
   * Backup & Recovery
   * Cybersecurity
   * Application Security
 * Cloud
   * Private Cloud
   * Public Cloud
   * Hybrid Cloud
 * Storage
   * Software Defined Storage
   * Object Storage
   * Physical Storage
 * DevOps
   * Analytics
   * Applications
   * Open Source


 * Data Management ▼
   * Networking
   * The Edge
   * Virtualization
   * Converged Infrastructure
 * Data Security ▼
   * Backup & Recovery
   * Cybersecurity
   * Application Security
 * Cloud ▼
   * Private Cloud
   * Public Cloud
   * Hybrid Cloud
 * Storage ▼
   * Software Defined Storage
   * Object Storage
   * Physical Storage
 * DevOps ▼
   * Analytics
   * Applications
   * Open Source
 * 



RSS
Channel info

Channel


HACKING THE HACKER: ASSESSING AND ADDRESSING YOUR ORGANIZATION’S CYBER DEFENSE
WEAKNESSES


Truth in IT
12/13/2023
Cybercriminals are out there, watching and waiting for the perfect opportunity.
They are gathering information about your organization and users, devising the
perfect plan to infiltrate your defenses.
 
But with a strategic approach to cyber defense you can hack the hacker before
they strike! In this session, we'll share insights into their strategies and
their motivations. You’ll learn how to use that understanding, along with simple
strategies to make your organization a hard target.
 
Join Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, for this new
webinar as he exposes the mind of a hacker to help you see your cyber risks from
the outside in.

In this session you’ll learn:
 * How hackers collect “private” details about your organization and your users
 * The most common root causes that lead to damaging cyber attacks
 * Common mistakes made when designing cyber defenses and how to fix them
 * Data-driven strategies for mitigating your biggest weaknesses
 * Why a strong human firewall is your best, last line of defense

Get the details you need to know how to outsmart cybercriminals before you
become their next victim. 

Categories:
 * » Spotlight Events
 * » Technology Communities » Data Security » Cybersecurity

Tags:
 * knowbe4
 * grimes
 * cyberdefence
 * cybersecurity
 * cyberdefense


X
Link
Embed
00:00

55:15
LIVE

1x
 * 
 * 
 * 
 * 
 * 
 * 
 * 

 * 0.25x
 * 0.50x
 * 0.75x
 * 1x
 * 1.25x
 * 1.5x
 * 1.75x
 * 2x
 * 4x

 * HQ
 * Normal

 * 





0s










Your user agent does not support the HTML5 Video element.





HACKING THE HACKER: ASSESSING & ADDRESSING YOUR ORGANIZATION'S CYBER-DEFENSES

Truth in IT
12/08/2023
439
26 (100%)

 * Share
   * Channel
   * Video

 * Comments
   * Channel
   * Video

 * Download

 * Transcript

Report Like Favorite
Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense
Weaknesses


CHANNEL

 * Share/Embed

Link


VIDEO

 * Share/Embed
 * E-Mail

Link


CURRENT VIDEO TRANSCRIPT



Show more Show less

PLAYLIST VIDEO TRANSCRIPTIONS



Show more Show less


CHANNEL'S COMMENTS: HACKING THE HACKER: ASSESSING AND ADDRESSING YOUR
ORGANIZATION’S CYBER DEFENSE WEAKNESSES





CHAT

Move/ResizeRestore



UPCOMING EVENTS

 * Jan
   25
   
   Upcoming
   
   UNLOCK THE POWER OF IT VISIBILITY: A COMPREHENSIVE GUIDE TO IMPACT AND
   INNOVATION
   
   01/25/2024
 * Feb
   01
   
   Upcoming
   
   AI SYNERGY UNLEASHED: BRIDGING DATA, IT, AND INNOVATION FOR FUTURE SUCCESS
   
   02/01/2024
 * Feb
   15
   
   Upcoming
   
   GUARDING THE CLOUD: TOP 5 CLOUD SECURITY HACKS AND HOW YOU CAN AVOID THEM
   
   02/15/2024

More events



RECENT EVENTS

 * PREVENTING DATA LOSS: SAFEGUARDING AGAINST THE TOP 5 RISKY USER BEHAVIORS
   
   6 days ago

 * CLOUDY WITH A CHANCE OF THREATS: THE ACTIVE THREAT LANDSCAPE IN THE CLOUD
   
   6 days ago

 * COMBATTING ROGUE URL TRICKS: HOW YOU CAN QUICKLY IDENTIFY AND INVESTIGATE THE
   LATEST PHISHING ATTACKS
   
   7 days ago

 * UNLOCK THE FULL ROI POTENTIAL OF MICROSOFT ENVIRONMENTS WITH INTELLIGENT IT
   DOCUMENTATION
   
   12 days ago

 * NEW SCHOOL SECURITY AWARENESS TRAINING WEB DEMO
   
   About a month ago

 * RAPIDLY RECOVER AT ENTERPRISE SCALE: RUBRIK DATA PROTECTION FOR MICROSOFT 365
   BACKUP STORAGE
   
   About a month ago

More Events



RECENT EVENT HIGHLIGHTS

 * STORMAGIC: SIMPLIFYING EDGE COMPUTING WITH HCI SOFTWARE
   
   4 months ago

 * VERGE.IO: 45 DAYS TO A VMWARE EXIT IN 4.5 STEPS
   
   4 months ago

 * WHERE DOES YOUR DATA GO? DATA LOSS PREVENTING AND STOPPING DATA EXFILTRATION
   
   5 months ago

 * NETSKOPE: HOW TO SAFELY ENABLE GENERATIVE AI & CHATGPT
   
   6 months ago

 * NUTANIX: OPTIMIZING ENTERPRISE WORKLOADS: IN THE CLOUD, ON-PREM AND AT THE
   EDGE
   
   8 months ago

More channels


 * 
 * 
 * 
 * 

 * Advertise
 * About Us
 * Terms of Service
 * Privacy Policy
 * Contact Us
 * Be Our Guest


Desktop version
Standard version
Hacking The Hacker: Assessing & Addressing Your Organization's Cyber-Defenses