[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” background_color=”#000000″ background_image=”/wp-content/uploads/2020/07/elti-meshau-208526.jpg” background_size=”contain” background_position=”top_left” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_row column_structure=”2_5,3_5″ _builder_version=”4.16″ _module_preset=”default” custom_margin=”|auto|30px|auto|false|false” custom_padding=”0px||||false|false” global_colors_info=”{}”][et_pb_column type=”2_5″ _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”][et_pb_image src=”/wp-content/uploads/2020/07/logo.png” title_text=”logo” _builder_version=”4.16″ _module_preset=”default” max_width=”300px” custom_padding=”109px|||||” global_colors_info=”{}”][/et_pb_image][/et_pb_column][et_pb_column type=”3_5″ _builder_version=”4.16″ _module_preset=”default” background_color=”rgba(0,0,0,0.68)” custom_padding=”130px|5%||5%|false|false” global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ _module_preset=”default” custom_padding=”0px|||||” global_colors_info=”{}”]
00 00 00
[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” header_font=”Passion One|700|||||||” header_text_align=”center” header_text_color=”#c41229″ header_font_size=”70px” header_line_height=”56px” custom_margin=”||-7px|||” global_colors_info=”{}”]
HACKING THE
HACKER
[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”Lato|700|||||||” text_text_color=”#eaeaea” text_font_size=”18px” text_orientation=”center” global_colors_info=”{}”]
DATE: Wed. February 26th, 2020
TIME: 11:30AM-1:00PM (Lunch served at noon)
643 Ilalo St. Honolulu, HI 96813
[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”Lato|700|||||||” text_text_color=”#FFFFFF” text_font_size=”18px” text_line_height=”26px” header_3_font=”Lato|700|||||||” header_3_font_size=”24px” header_3_line_height=”26px” global_colors_info=”{}”]
What can I expect to learn?
- A behind the scenes look at the Dark Web
- How to protect your data and prevent your business from becoming the next victim of a cyberattack.
- What social engineering is and how cybercriminals use certain tactics to get your data and other valuable information.
- How to spot electronic distraction techniques and what to do if you suspect something is amiss.
- What the different types of phishing are, how to deal with them, and how to successfully avoid them.
Why should I go?
- 73% Percentage of employees opening malicious email attachments.
- 77% Amount of security professionals who rank user awareness training the most effective tactic to prevent and block ransomware.
- 62% Goal of cyberattacks to gain financial information.
[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”Roboto|500|||||||” text_font_size=”16px” global_colors_info=”{}”]
[gravityform id=5 ajax=true title=false]
[/et_pb_text][et_pb_text _builder_version=”4.16″ _module_preset=”default” text_font=”Roboto|700|||||||” text_text_color=”#FFFFFF” text_font_size=”28px” text_line_height=”32px” text_orientation=”center” global_colors_info=”{}”]
Space is Limited
Please RVSP
[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]