Watch On-Demand

Click the video player below to watch the webinar on-demand. If you are having issues accessing the recording, please email nacomeetings@naco.org.

To understand the crime, you must first understand the criminal. Step beyond cybersecurity protection and into the mind of a hacker. Cybercriminals maneuver in the shadows, access through backdoors, and exploit vulnerabilities to gain network and systems access. Gain eye-opening insight into the approach, tools, and mindset of cybercriminals through redacted, but real-world, hacking examples of how an attacker moves through a network and how to defend against threat outbreaks.

By attending this webinar, participants will:

  • Learn how hackers bypass fixes and security patches to exploit systems
  • Walkthrough real examples of various types of vulnerabilities
  • Review key storage recommendations and remediation tactics

Designed for a non-technical audience, a Tyler Technologies expert offers an educational breakdown of redacted real-world cyber attacks with a focused goal of understanding more about hackers, how hacking happens, and knowing key vocabulary to feel confident discussing security and vulnerabilities before, and when, they happen.

Watch

Speakers

Headshot - EBurgess.png

Erica Burgess

Senior Cybersecurity Technical Leader, Tyler Technologies
Image of Rita-Reynolds-2.png

Rita Reynolds

Chief Information Officer, NACo

Related News

Dennis Alvord, assistant executive director of the First Responder Network Authority, speaks Friday, July 12 to members of the NACo Telecommunications and Technology Steering Committee. Photo by Denny Henry
County News

Public agency expands first responder network

Twenty-three years after the 9/11 tragedy, a public agency created in its wake to help better connect first responders during emergencies is continuing to ramp up improvements to its networks.

US Senate
Advocacy

U.S. Senate releases roadmap on artificial intelligence

On May 15, the U.S. Senate’s Bipartisan AI Working Group released their roadmap on artificial intelligence entitled Driving U.S. Innovation in Artificial Intelligence: A Roadmap for Artificial Intelligence Policy in the United States Senate.

Image of GettyImages-1355381242.jpg
Advocacy

Senate Rules Committee considers elections and AI legislation ahead of 2024 General Elections

Senate Rules Committee held business meeting on May 15 to markup and consider legislation on the role of artificial intelligence in elections.

Image of GettyImages-1281545908.jpg
Advocacy

U.S. Senate eyes funding the Affordable Connectivity Program through broader telecommunications package

The ACP is under a short timeline to receive additional funding. After May 31, all 23 million enrolled households will cease to receive any benefit from the program. Several Senate proposals could lead to expedited passage of funding to save the program.

US Capitol side
Advocacy

Congressional leaders introduce new legislation for a national data privacy framework

On April 7, U.S. House Energy and Commerce Committee Chair Cathy McMorris Rodgers (R-Wash.) and U.S. Senate Commerce, Science and Transportation Committee Chair Maria Cantwell (D-Wash.) introduced the American Privacy Rights Act. 

1466091682
Advocacy

DOJ issues final rule for state and local governments to implement web-based accessibility standards

On April 8, the U.S. Department of Justice (DOJ) announced the release of a web accessibility final rule for state and local governments. 

Upcoming Events

Image of Technology.jpeg
Webinar

Implementing County Web Accessibility Standards: Overview and Strategy Session

Join NACo as we hear from the DOJ for an overview of the new DOJ guidance, ask questions, and engage in a panel to discuss implementation strategies, challenges, and opportunities for counties. 

Woman looking at her credit card
Webinar

NACo Cyberattack Simulation: Financial Access

Financial transaction systems are prime targets for cyber threats due to the value and sensitivity of the data. This cyber simulation assesses risks and fortifies safeguards within financial access systems.

lines of data with a lock
Webinar

NACo Cyberattack Simulation: Cloud Security

Cloud computing has become integral to modern business and government operations, offering scalability, flexibility, and efficiency.