What looks like an innocent QR code has become a sinister weapon in the cybercriminal's arsenal. A staggering 25% of all email phishing attacks now exploit QR codes. Why? Because unsuspecting users scan first and ask questions later, creating a perfect storm of vulnerability that's sweeping through organizations worldwide.

Join us for this eye-opening webcast where Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, will peel back the layers of QR code attacks and arm you with the knowledge to fortify your defenses.

You will discover:

•  The mechanics behind QR codes—and why they're a hacker's dream
•  Real-world examples of QR code phishing that could happen to YOU
•  Battle-tested strategies to shield your organization from these pixel-powered threats
•  The secret weapon in your security arsenal: how user training on cutting-edge threats can transform your entire security culture

Don't let your organization fall victim to a simple square of dots!

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
Speakers
speaker photo
Roger Grimes
Data-Driven Defense Evangelist, KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications, and an award-winning author of 10 books and more than 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee, and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

Moderator
speaker photo
Tom Bechtold
Digital Events Director, SecureWorld
Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.