How a Cyber Attacker Moves Through a Network
Watch On-Demand
Click the video player below to watch the webinar on-demand. If you are having issues accessing the recording, please email nacomeetings@naco.org.
To understand the crime, you must first understand the criminal. Step beyond cybersecurity protection and into the mind of a hacker. Cybercriminals maneuver in the shadows, access through backdoors, and exploit vulnerabilities to gain network and systems access. Gain eye-opening insight into the approach, tools, and mindset of cybercriminals through redacted, but real-world, hacking examples of how an attacker moves through a network and how to defend against threat outbreaks.
By attending this webinar, participants will:
- Learn how hackers bypass fixes and security patches to exploit systems
- Walkthrough real examples of various types of vulnerabilities
- Review key storage recommendations and remediation tactics
Designed for a non-technical audience, a Tyler Technologies expert offers an educational breakdown of redacted real-world cyber attacks with a focused goal of understanding more about hackers, how hacking happens, and knowing key vocabulary to feel confident discussing security and vulnerabilities before, and when, they happen.
Watch
Speakers
Erica Burgess
Rita Reynolds
Featured Resource
County Tech Xchange
The NACo County Tech Xchange is an online portal designed to connect county CIOs, IT Directors, CISOs, and other county IT leadership. This portal provides valuable resources in a central location that counties can use to improve their overall technology infrastructure.