Hackers and Scammers and Thieves! Oh my!
Hackers, scammers and thieves have one mission - to separate you from your money and identity. With so much focus on staying safe online, criminals are successfully targeting you with ever-evolving techniques and tactics that don't involve your smartphone or computer. Learn how to stay safe online, offline and in the real world. Learn from real examples of how criminals are coming after you.
Small Business is Big Business to Hackers
Three out of five cyber attacks target small to medium sized businesses. The myth of hackers only going after large companies is thoroughly debunked in this eye-opening presentation. Morgan clearly spells out ‘why’ hackers like smaller companies, and what these companies need to do before its too late.
The Growing Threat of Social Media and Terrorism
“Strike the soldiers…strike their police, security and intelligence members…” was the message is a video posted by ISIS on a hacked US Central Command (CENTCOM) YouTube channel. That was after hacking CENTCOM’s twitter account as well - a hack that could have been prevented with a remarkably simple tool. The growing use of propaganda spread by social media is inspiring terrorism here and abroad. From San Bernardino to Paris, terrorists are using advanced technology and social media in ways that frustrate the ability of law enforcement to monitor and prevent future attacks. This provocative presentation looks at how we’re losing the war of influence and what can be done about it.
Hacking The Human: You Are The Weakest Link
In this fascinating presentation, Morgan draws upon his skills with behavioral analysis interviewing and shows how hackers and terrorists are going after the weakest link in any organization - you. From social engineering to spear phishing, the largest attacks and data breaches have occurred because of human weakness. From his time instructing damage assessment agents at the highly secretive NSA (agents who investigated the biggest espionage cases of all time) to the FBI, state and local law enforcement, Morgan shows how this same human weakness can actually be used to defend against new threats.
End Of Days: The Threat of Terrorism To Critical Infrastructure
“If you want to hit a country severely you hit its power and water supplies. Cyber technology can do this without shooting a single bullet.” So said Major General Isaac Ben-Israel of the Israeli Air Force. The US critical infrastructure is highly at risk from a coordinated cyber attack against key elements of our power grid. The BlackEnergy malware attack in Ukraine on Dec. 23, 2015 that left 800,000 homes without power, was the first verified cyberattack against an electrical grid. This same malware has thoroughly infected our own systems, leaving the United States in grave danger from an extensive, and extended, cyberattack. What should be done from a policy and technology perspective is the take-away from this timely presentation.