Watch On-Demand

Click the video player below to watch the webinar on-demand. If you are having issues accessing the recording, please email nacomeetings@naco.org.

To understand the crime, you must first understand the criminal. Step beyond cybersecurity protection and into the mind of a hacker. Cybercriminals maneuver in the shadows, access through backdoors, and exploit vulnerabilities to gain network and systems access. Gain eye-opening insight into the approach, tools, and mindset of cybercriminals through redacted, but real-world, hacking examples of how an attacker moves through a network and how to defend against threat outbreaks.

By attending this webinar, participants will:

  • Learn how hackers bypass fixes and security patches to exploit systems
  • Walkthrough real examples of various types of vulnerabilities
  • Review key storage recommendations and remediation tactics

Designed for a non-technical audience, a Tyler Technologies expert offers an educational breakdown of redacted real-world cyber attacks with a focused goal of understanding more about hackers, how hacking happens, and knowing key vocabulary to feel confident discussing security and vulnerabilities before, and when, they happen.

Watch

Speakers

Headshot - EBurgess.png

Erica Burgess

Senior Cybersecurity Technical Leader, Tyler Technologies
Image of Rita-Reynolds-2.png

Rita Reynolds

Director of Public Sector, CAI

Related News

Image of 180917-AmericanTower-Tacoma-129_0.jpeg
Advocacy

House committee passes local broadband permitting preemption bills

The American Broadband Deployment Act of 2025 would enact new restrictions on a variety of state and local land use and zoning authorities pertaining to the deployment of telecommunications infrastructure.

White House
Advocacy

White House signs Executive Order on state AI lawmaking

President Trump signed an Executive Order (EO) aimed at mobilizing federal agencies to challenge existing state laws on artificial intelligence.

Image of GettyImages-1328094196.jpg
Advocacy

FCC considers preemption of local authorities in broadband permitting process

Counties are partners in broadband deployment efforts – not barriers – and pursuing one-size-fits-all regulations will further burden progress towards closing the digital divide 

man pointing at a cybersecurity shield with a checkmark and then a checklist is next to it
Advocacy

Congress Considers Bills to Reauthorize State and Local Cybersecurity Grant Program

Congress is considering two bills to reauthorize the State and Local Cybersecurity Program