Watch On-Demand

Click the video player below to watch the webinar on-demand. If you are having issues accessing the recording, please email nacomeetings@naco.org.

To understand the crime, you must first understand the criminal. Step beyond cybersecurity protection and into the mind of a hacker. Cybercriminals maneuver in the shadows, access through backdoors, and exploit vulnerabilities to gain network and systems access. Gain eye-opening insight into the approach, tools, and mindset of cybercriminals through redacted, but real-world, hacking examples of how an attacker moves through a network and how to defend against threat outbreaks.

By attending this webinar, participants will:

  • Learn how hackers bypass fixes and security patches to exploit systems
  • Walkthrough real examples of various types of vulnerabilities
  • Review key storage recommendations and remediation tactics

Designed for a non-technical audience, a Tyler Technologies expert offers an educational breakdown of redacted real-world cyber attacks with a focused goal of understanding more about hackers, how hacking happens, and knowing key vocabulary to feel confident discussing security and vulnerabilities before, and when, they happen.

Watch

Speakers

Headshot - EBurgess.png

Erica Burgess

Senior Cybersecurity Technical Leader, Tyler Technologies
Image of Rita-Reynolds-2.png

Rita Reynolds

Director of Public Sector, CAI

Related News

Image of 180917-AmericanTower-Tacoma-129_0.jpeg
Advocacy

House committee passes local broadband permitting preemption bills

The American Broadband Deployment Act of 2025 would enact new restrictions on a variety of state and local land use and zoning authorities pertaining to the deployment of telecommunications infrastructure.

White House
Advocacy

White House signs Executive Order on state AI lawmaking

President Trump signed an Executive Order (EO) aimed at mobilizing federal agencies to challenge existing state laws on artificial intelligence.

Image of GettyImages-1328094196.jpg
Advocacy

FCC considers preemption of local authorities in broadband permitting process

Counties are partners in broadband deployment efforts – not barriers – and pursuing one-size-fits-all regulations will further burden progress towards closing the digital divide 

man pointing at a cybersecurity shield with a checkmark and then a checklist is next to it
Advocacy

Congress Considers Bills to Reauthorize State and Local Cybersecurity Grant Program

Congress is considering two bills to reauthorize the State and Local Cybersecurity Program

County Countdown
Advocacy

County Countdown – Dec. 1, 2025

Every other week, NACo's County Countdown reviews top federal policy advocacy items with an eye towards counties and the intergovernmental partnership.

Upcoming Events

A pen rests near a calculator
Webinar

Modern Networks, Smarter Budgets: A County Leader's Perspective

Join us for a fireside chat with Orleans County, NY, as they share how their team successfully transitioned from a traditional capital expense (CapEx) model to an operational expense (OpEx) model for network services.

When faced with rising maintenance costs and an expiring carrier contract, the county seized the opportunity to modernize its network and lock in predictable monthly costs. By bundling connectivity services with unified communications, they achieved immediate savings of over $124,000, eliminated recurring charges such as long-distance fees and third-party integration costs, and gained access to operational upgrades like call analytics and auto-attendants.

This shift not only strengthened financial planning through fixed monthly expenses but also freed up IT staff to focus on strategic initiatives.

Key takeaway: Rethinking your budget model can be just as impactful as upgrading your technology — delivering fiscal stability and enhanced services for your community.