Recorded June 19, 2019
This training is intended for U.S. Criminal Justice
Practitioners. Please register using your agency-issued email.
It is widely acknowledged that phishing is responsible for >90% of
breaches occurring today. Basic phishing primarily exploits human behavior to
entice a victim to ‘click the link’ or ‘open the attachment’ thus often handing
over to the criminal the golden nugget – valid access credentials. While we are
all taught not to click or open the attachment, the scheme is still highly
successful and profitable. In fact, recent reporting indicates that regardless
of the amount of training provided, organizations will likely see at least 4% of
their workforce click on a link thus resulting in some sort of compromise.
During this webinar, a panel of NCFTA experts will explain how
phishing campaigns are conducted; from developing a “phish kit”, to weaponizing a
botnet for delivery, using any stolen credentials for financial gain, then
laundering millions of dollars all over the world to fund their lavish lifestyles at
Kyle Hettinger, Training Coordinator and
Senior Intelligence Analyst, NCFTA
Taylor Transue, Cyber Intelligence
Owen Nearhoof, Cyber Intelligence Analyst,
The views and opinions expressed in this presentation are
those of the individual presenters and do not represent official policy,
position, opinions, or views of NW3C.
NW3C does not share webinar attendees’ personally
identifiable information with any third party without opt-in consent given