C  Spire logo with a blue stylized C symbol

Webinars:'Inside the Cyber Attacker's Mind

Published on October 17, 2017
Webinars:'Inside the Cyber Attacker's Mind

If you play a role in securing an organization's internal systems, you won't want to miss TekLinks” two-part webinar series Inside the Cyber Attacker's Mind. TekLinks” Cybersecurity Consulting Group will take you on a technical deep dive into various cybersecurity topics, including discussion and analysis around the types of tactics and techniques that malicious threat actors are using to breach environments. This is a perfect opportunity for IT leaders to gain valuable insights from an attacker's perspective.

Registration is now open, and space is limited:

Answers to the Test: How to Pass Your Next Internal Penetration Test with Flying Colors: Learn from TekLinks” penetration testers the top 10 most commonly observed issues during penetration testing engagements.

Date: Wednesday, November 1

Time: 10am CST/11:00am EST

[REGISTER HERE - Session 1](https://teklinksinc.webex.com/mw3200/mywebex/default.do?nomenu=true&siteurl=teklinksinc&service=6&rnd=0.8699261096647638&main_url=https%3A%2F%2Fteklinksinc.webex.com%2Fec3200%2Feventcenter%2Fevent%2FeventAction.do%3FtheAction%3Ddetail%26%26%26EMK%3D4832534b00000004353285a9cd01a03e3c888f18d39222fea6079756ffab3972489f943dfeaa89d2%26siteurl%3Dteklinksinc%26confViewID%3D75626160963201633%26encryptTicket%3DSDJTSwAAAAQaF9TDpkGqxW9bJxgMepZtfdLZ5-Ew0S_sxdTX7Urnyg2%26&utm_campaign=Cybersecurity%20Webinar%20Series%202017&utm_medium=email&_hsenc=p2ANqtz-8G0WuLO1kJofRJjGe3J9iyKmjDCh-8b8Ur-CUucijzrpknQi6wDx58xYjMgnLezC02i3T-dMORr6Pa12J__kk4n502PQ&_hsmi=2&utm_content=2&utm_source=hs_email&hsCtaTracking=ccd0a219-25bd-4a03-a3f6-47ebc2b20292%7C485dc207-6a67-4629-a6fa-2a66cae87c69)

Anatomy of a Phish: Technical Walk-Thru of a Successful Phishing Attack: What actually happens when one of your employees has been successfully phished and runs a malicious file on their computer? We'll show you how an attacker can create a custom file that can often bypass email filtering controls and endpoint antivirus to gain remote control of an employee computer without being detected.

Date: Wednesday, November 8

Time: 10am CST/11:00am EST

[REGISTER HERE - Session 2](https://teklinksinc.webex.com/mw3200/mywebex/default.do?nomenu=true&siteurl=teklinksinc&service=6&rnd=0.09124812641494373&main_url=https%3A%2F%2Fteklinksinc.webex.com%2Fec3200%2Feventcenter%2Fevent%2FeventAction.do%3FtheAction%3Ddetail%26%26%26EMK%3D4832534b000000049e881348817c93621c3c6052b0414327f80b049dbbcfd8c62fcce8764150da12%26siteurl%3Dteklinksinc%26confViewID%3D75628719851448650%26encryptTicket%3DSDJTSwAAAAR2P6MWd8RFZxjOGEBoixtN9hfuiE8nsMC5Ke1sidmbDg2%26)

TekLinks' Cybersecurity Consulting Groupis a team of certified information security experts who perform a wide variety of security engagements for its customers, including advanced penetration testing, custom social engineering engagements, and much more.