LMG Security Events

Date
Event
Type
Location
07/25/2023 - 07/25/2023
Webinar
Online

What makes the dark web so dark? Join us for a deep dive into the inner workings of the darkest corners of the internet. Come along for a guided tour of the criminal underground and see first-hand how hackers and criminals use the anonymity of the dark web to sell their goods and hide their crimes. We’ll also cover how the dark web can be used for good by enabling spies, journalists, and others to protect their privacy. Finally, we’ll discuss how the dark web and the underground economy it provides are directly related to the latest cyber threats, enabling hackers to buy malware, 0-day exploits, and much more.

07/12/2023 - 07/12/2023
Training and Education
Online

Find your weaknesses before the hackers do! In order to effectively defend your IT infrastructure, you need to explore your network in the same way as hackers. This practical, hands-on class will teach you to do just that: pentest your own network. Along the way, we’ll cover detailed remediation tips, and test out various techniques for stopping attackers and ensuring that your changes work. Learn to hack your own network—and fix the issues—in this practical penetration testing class for IT professionals. 
06/14/2023 - 06/14/2023
Webinar
Online

Cybercrime has evolved rapidly, and we all need to hone our response techniques to match. Today’s adversaries are increasingly destructive and have developed effective techniques for rapidly destroying your IT infrastructure. During the aftermath of an attack, they routinely monitor the victim’s communications and may even conduct social engineering attacks based on your incident response processes. Join us and get practical strategies for adapting your incident response best practices to reflect today’s increasingly interconnected threat landscape.

06/08/2023 - 06/08/2023
Speaking
Des Moines, Iowa

Join Marco and LMG Security for an event on Printer Security on Thursday, June 8th at Court Avenue Brewing. We are excited to have Tom Pohl, Penetration Testing Team Manager and Senior Cybersecurity Consultant from LMG Security, demonstrate hacking.

06/07/2023 - 06/07/2023
Training and Education
Des Moines, Iowa

Find your weaknesses before the hackers do! In order to effectively defend your IT infrastructure, you need to explore your network in the same way as hackers. This practical, hands-on class will teach you to do just that: pentest your own network. Along the way, we’ll cover detailed remediation tips, and test out various techniques for stopping attackers and ensuring that your changes work. Learn to hack your own network—and fix the issues—in this practical penetration testing class for IT professionals.
05/16/2023 - 05/16/2023
Webinar
Online

With the growing trend of Bring Your Own Device (BYOD) to work, the risk of mobile device security breaches is increasing rapidly. In this fast-paced webinar, we’ll cover the key threats to mobile device security, common gaps in BYOD policies, and how you can protect your organization’s sensitive data on the go.

05/04/2023 - 05/04/2023
Webinar
Online

In this fast-paced tabletop exercise, seasoned experts from Castellum.AI and LMG Security will show you how to navigate the ransomware response and payment process safely and effectively. We’ll provide valuable guidance for everyone involved in the response, from victim companies to IR firms to insurance companies and more.
04/11/2023 - 04/11/2023
Webinar
Online

Not all security technologies are created equal! Get the inside scoop on which security controls are the most effective and what to prioritize. We’ll walk through real-world cases, discuss underlying factors and highlight solutions that really work.

03/30/2023 - 03/30/2023
Webinar
Online

Often on penetration tests we encounter printers. Lots of printers. Come watch as we demonstrate how to make your printer do things that will make your IT admins gasp in fear! Along the way, we’ll provide tips for stopping hackers at every stage.

03/14/2023 - 03/14/2023
Webinar
Online

Your organization’s security is only as strong as its weakest link – and that link could be your vendors. From Rackspace to Okta to MSP hacks and more, discover how technology vendors, software providers and other suppliers can leave you vulnerable to cyberattacks.

03/09/2023 - 03/09/2023
Training and Education
Online

 Learn to respond to ransomware effectively and efficiently in our one-day virtual class. This course includes simple steps you can take to reduce your risk of a ransomware attack and respond effectively, now and in the future. 
02/22/2023 - 02/22/2023
Webinar
Online

Ransomware has gotten sneakier. In response to highly-publicized law enforcement busts and disruptive measures, criminals have developed novel tactics such as partial encryption strategies, which are designed to speed destruction and evade detection. In this fast-paced talk, the authors of the new book, “Ransomware and Cyber Extortion,” will demonstrate the latest techniques and provide critical guidance for protecting your organization.

01/24/2023 - 01/24/2023
Webinar
Online

Cybercriminals are taking hacking to the next level by leveraging ever more sophisticated toolsets and rapidly evolving techniques. Join us to hear cybersecurity experts Sherri Davidoff and Matt Durrin share the biggest cybersecurity threats and most concerning criminal tactics for 2023 and how you can protect your organization.
12/06/2022 - 12/06/2022
Webinar
Online

All hackers need is the tiniest foothold inside your network, and they can take over, stealing your most valuable data, launching ransomware attacks, and more. Watch as we demonstrate a full real-world takeover, starting with zero access from the Internet. Along the way, we’ll provide you with tips for stopping hackers at every stage.

11/09/2022 - 11/09/2022
Webinar
Online

Cybercriminals want to break into your email to steal sensitive data, conduct fraud, or reset passwords for your other accounts. In this webinar on November 9th, we’ll show you how hackers break into your email, fake invoices and wire fraud examples, how to recognize spoofed emails, and the top ways to protect your email account.

10/20/2022
Webinar
On Demand

Do you hate passwords? You’re not alone. Even the best passwords can be stolen or guessed. Today, multifactor authentication (MFA) is a must—but hackers have honed techniques for bypassing common MFA tools. In this practical presentation, we’ll discuss:

• How hackers bypass authentication
• Critical MFA configuration changes that can thwart hackers
• Password managers – how hackers target them, and you can protect them
• Biometric authentication options, including facial recognition, palm prints and more
• Single-sign-on and other enterprise tools to streamline authentication
• Identity and access management

Learn how you can reduce risk and frustration in this fast-paced talk.

 

09/21/2022
Webinar
On Demand

The world has changed—and your cybersecurity budget needs to change with it. Criminals have ramped up attacks on the supply chain and the cloud, while remote work has introduced new weaknesses. How can you maximize your ROI on cybersecurity investments in today’s new landscape? In this fast-paced webinar, we’ll highlight smart areas to prioritize for the coming year.

09/01/2022
Webinar
On Demand

What are the hottest issues in cybersecurity right now? We’ll discuss new exploits and cutting-edge security research from the Black Hat 2022 and DEFCON conferences, including:* New security vulnerabilities in the 5G cellular network

07/28/2022 - 07/28/2022
Training and Education
Online

Cybersecurity first responders need to react quickly to identify data breaches and minimize potential losses. Learn how to respond to malware, cloud breaches, network intrusions & more in this intensive one-day bootcamp. Bring your caffeine and be ready!

07/19/2022
Webinar
On Demand

Is an attacker lurking inside your network? Have your cloud accounts been accessed without your knowledge? Cybercriminals routinely hack systems and then lurk for weeks or months, monitoring conversations, siphoning off valuable data, and eventually installing ransomware. Proper monitoring and logging can help you to detect these intrusions early on—or even prevent them from happening in the first place.


CONTACT US