How a Cyber Attacker Moves Through a Network

October 17th, 2023 | 1 PM Eastern 

To understand the crime, you must first understand the criminal. Step beyond cybersecurity protection and into the mind of a hacker. Cybercriminals maneuver in the shadows, access through backdoors, and exploit vulnerabilities to gain network and systems access. Gain eye-opening insight into the approach, tools, and mindset of cybercriminals through redacted, but real-world, hacking examples of how an attacker moves through a network and how to defend against threat outbreaks.
By attending this webinar, participants will:

• Learn how hackers bypass fixes and security patches to exploit systems • Walkthrough real examples of various types of vulnerabilities

• Review key storage recommendations and remediation tactics

Designed for a non-technical audience, a Tyler Technologies expert offers an educational breakdown of redacted real-world cyber attacks with a focused goal of understanding more about hackers, how hacking happens, and knowing key vocabulary to feel confident discussing security and vulnerabilities before, and when, they happen.

*Hint: DO NOT use your own email if you are registering someone else. You must use the email of the person who will attend. It will also help to use the email that receives NACo correspondence (i.e. your county or organization email).​

If you have any registration questions, please email nacomeetings@naco.org.