Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn't!

Join Roger A. Grimes—KnowBe4's Data-Driven Defense Evangelist and security expert with over 30 years' experience—for this webcast where he will explore 12 ways hackers can and do get around your favorite MFA solution.

This webinar includes a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer, Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your MFA solution so that you get maximum benefit and security.

You'll learn about the good and bad of MFA, and become a better computer security defender in the process, including:

•  12 ways hackers get around multi-factor authentication
•  How to defend your MFA solution
•  The role humans play in a blended-defense strategy

Be sure to submit your questions in advance so our presenters can get you the answers you need.

Generously Supported By:

supported by logo
Speakers
speaker photo
Roger Grimes
Data-Driven Defense Evangelist, KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

speaker photo
Kevin Mitnick (pre-recorded video)
Chief Hacking Officer, KnowBe4

Once one of the FBI’s Most Wanted because he hacked into 40 major corporations just for the challenge, Kevin is now a trusted security consultant to the Fortune 500 and governments worldwide.

Kevin and his Global Ghost Team™ now maintain a 100 percent successful track record of being able to penetrate the security of any system they are paid to hack into using a combination of technical exploits and social engineering. As CEO and chief “white hat” hacker at one of the most advanced boutique security firms in the world, Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees—learn how to protect their information and themselves from harm, using understandable terms and a friendly approach.