Welcome to the CYBERWISER.eu Cyber Risk Awareness Webinar series, showing how your staff can use the CYBERWISER.eu platform for professional training on cyber threats and attacks. Each of the 5 Webinars will take participants through different hands-on cyber range exercises on some of the most popular threats and attacks with topics varying from Awareness of Password Weaknesses, SQL Injection, Phishing and more. Here's an overview of the first webinar on 5th August 2020 at 15:00 CEST.
Awareness of Password Weaknesses.
Why it is important to have a password, good practices to use when defining it and how easy it is to exploit weak passwords to access a company's infrastructure (shown in real time through a hands-on cyber range exercise).
SMEs, Large Enterprises, Public Sector Organisations, Institutions of Higher Education and Research Centres.
The topic of the first webinar of this series is on Awareness of Password Weaknesses. According to internet security threat reports by Symantec and WatchGuard, weak passwords are a major security threat. Symantec reports that IoT devices experienced an average of 5200 attacks per month in 2018 and that 24.6% of passwords used in IoT attacks were "123456", while 17% were blank in the sense that there were no passwords. WatchGuard carried out an investigation of passwords used for 335,000+ government and military accounts and found that nearly half of all passwords associated with .gov and .mil email addresses are weak. As an example, they found 1700 cases where the password "123456" was used. Having weak passwords is one of the most commonly used vulnerabilities used to access a company's infrastructure and facilitate more complex attacks. If you want to protect your company and its assets, it is essential that your entire team has a clear understanding of this topic.
At CYBERWISER.eu we take Awareness of Password Weaknesses seriously. As a matter of fact we have 2 entire courses dedicated to it:
In this webinar we will explain why it is important to have a password and we will share some good practices to use when defining it. Most importantly, we will show you a demo of the hands-on exercise we propose in our B05 - Awareness of Password Weaknesses with hands-on training from the Basic Offering Level, to show you how easy it is to exploit weak passwords to gain access to a company's infrastracture and assets.
|15:00 - 15:10||Welcome and Introduction to the Open Pilot process||Niccolò Zazzeri, Trust-IT Services|
|15:10 - 15:15||Introduction to the CYBERWISER.eu Platform||Antonio Álvarez Romero, ATOS|
|15:15 - 15:20||Introduction to the topic covered by each webinar||Vasileios Fotis, RHEA|
|15:20 - 15:40||Password Weaknesses Hands-on Cyber Range exercise||Vasileios Fotis, RHEA|
|15:40 - 15:50||Q&A|
|15:40 - 15:45||Closing remark and open pilot reminder||Niccolò Zazzeri, Trust-IT Services|