Watch On-Demand

Click the video player below to watch the webinar on-demand. If you are having issues accessing the recording, please email nacomeetings@naco.org.

To understand the crime, you must first understand the criminal. Step beyond cybersecurity protection and into the mind of a hacker. Cybercriminals maneuver in the shadows, access through backdoors, and exploit vulnerabilities to gain network and systems access. Gain eye-opening insight into the approach, tools, and mindset of cybercriminals through redacted, but real-world, hacking examples of how an attacker moves through a network and how to defend against threat outbreaks.

By attending this webinar, participants will:

  • Learn how hackers bypass fixes and security patches to exploit systems
  • Walkthrough real examples of various types of vulnerabilities
  • Review key storage recommendations and remediation tactics

Designed for a non-technical audience, a Tyler Technologies expert offers an educational breakdown of redacted real-world cyber attacks with a focused goal of understanding more about hackers, how hacking happens, and knowing key vocabulary to feel confident discussing security and vulnerabilities before, and when, they happen.

Watch

Speakers

Headshot - EBurgess.png

Erica Burgess

Senior Cybersecurity Technical Leader, Tyler Technologies
Image of Rita-Reynolds-2.png

Rita Reynolds

Chief Information Officer

Related News

bike
Advocacy

Senate Rules Committee considers elections and AI legislation ahead of 2024 General Elections

Senate Rules Committee held business meeting on May 15 to markup and consider legislation on the role of artificial intelligence in elections. The Preparing Election Administrators for AI Act would direct the Election Assistance Commission to develop voluntary guidelines on the use and risks of AI technologies for county election officials.

Image of GettyImages-1281545908.jpg
Advocacy

U.S. Senate eyes funding the Affordable Connectivity Program through broader telecommunications package

The ACP is under a short timeline to receive additional funding. After May 31, all 23 million enrolled households will cease to receive any benefit from the program. Several Senate proposals could lead to expedited passage of funding to save the program.

US Capitol side
Advocacy

Congressional leaders introduce new legislation for a national data privacy framework

On April 7, U.S. House Energy and Commerce Committee Chair Cathy McMorris Rodgers (R-Wash.) and U.S. Senate Commerce, Science and Transportation Committee Chair Maria Cantwell (D-Wash.) introduced the American Privacy Rights Act. 

1466091682
Advocacy

DOJ issues final rule for state and local governments to implement web-based accessibility standards

On April 8, the U.S. Department of Justice (DOJ) announced the release of a web accessibility final rule for state and local governments. 

Internet router
Advocacy

Congress deliberates the future of the Affordable Connectivity Program

On January 10, the bipartisan Affordable Connectivity Program Extension Act of 2024 was introduced in the U.S. House of Representatives. 

Communication cables
Advocacy

Bureau of Land Management updates regulations for broadband infrastructure development on federal public lands

The BLM published a final rule to update regulations for developing and operating broadband infrastructure on public lands.

Upcoming Events

Coding with a lock
Webinar

How to Deliver a County AI Idea Hackathon

One collaborative strategy in prioritizing and evaluating AI Use-Cases is to hold an AI Hackathon. During this webinar, you will hear from Alameda County, California, and King County, Washington, on how they have taken this approach. The concept, along with steps for preparing and for delivering the Hackathon, will be shared. Tips on how to engage partner and county wide staff will also be covered.

Two people look at a computer together
Webinar

Doing More with Less: Sustaining the County Government Workforce with Artificial Intelligence

Today’s county government landscape is at a pivotal juncture, with artificial intelligence (AI), machine learning, and big data technologies spearheading a revolutionary shift. A transformation is essential in an era where service delivery, technological advancements, and evolving workforce dynamics intersect. Amidst these challenges lies a critical question: How can county governments efficiently serve their communities with fewer resources while meeting the increasing expectations of today’s public?

A group of business people shake hands
Webinar

NACo Cyberattack Simulation: Supplier Management Access

Effective partner management is integral to the operational efficiency of government business, yet it poses inherent cybersecurity risks, especially concerning partner access to sensitive systems and data.

Woman looking at her credit card
Webinar

NACo Cyberattack Simulation: Financial Access

Financial transaction systems are prime targets for cyber threats due to the value and sensitivity of the data. This cyber simulation assesses risks and fortifies safeguards within financial access systems.

lines of data with a lock
Webinar

NACo Cyberattack Simulation: Cloud Security

Cloud computing has become integral to modern business and government operations, offering scalability, flexibility, and efficiency.