© Copyright 2020 AccountantsWorld

The 2020 Expert Webinar Series

The most significant security threat to businesses is far from being the exotic, technologically advanced attack vector so favored by Hollywood screenwriters and Sci-Fi novelists. These threats, often described as using highly competent code and advanced-scripting, may be more entertaining to watch or read about, but they aren’t the threat that’s been used to hack the Democratic National Committee, shut down industrial and manufacturing plants, or even breach the best-known symbol of American power – the White House.

The terrifying threat that actually has done these things all while costing U.S. businesses and organizations hundreds of millions of dollars each day is plain ole’, run-of-the-mill phishing.

In this session we’ll explain what phishing is, why it’s the most effective (and proliferated) of many techniques collectively classified as Social Engineering and how it is used by attackers to obtain either full or partial credentials (e.g. username & password).

Watch On-Demand

Presented December 2, 2020

Title TBD

By Michael Seip
Security Consultant & Project Manager, Withum Cyber


Watch On-Demand

What, Me Worry? Actions & Ideas to Help Minimize Cybersecurity Threats in a Post-COVID World

Webinar series main

Michael Seip
Security Consultant & Project Manager, Withum Cyber     

Michael is an experienced technical leader with experience in technology sector. He has 12 years of experience as a director of operations and senior program/project manager. He has extensive knowledge in PMO Ops, contracting operations, strategic planning and risk management. Michael gained leadership experience from over nine years if service as a US Navy Fighter/Attacker aviator.

At the end of this session you will have a better understanding of:

  • Existing threat landscape in a post-COVID world

  • Continuous monitoring & automated vulnerability scanning: how/why your organization can improve overall network & system integrity

  • Security Assessment and penetration testing (i.e. ‘Pen Testing’) tactics which may highlight a network’s “weak-spots” and provide details regarding training deficiencies weakening a workforce’s front-line

  • Social Engineering gotchas – as actually observed “in the wild” by cybersecurity consultants & experts during operations throughout the COVID-19 pandemic timeline.