Hacking - It's Not Magic

Overview

A good magician doesn’t reveal the trick – but a “white hat” hacker can! We will go through the process of hacking a real person in real time. See how hackers perform reconnaissance, scan for vulnerabilities, and use social engineering to gain access to the victim’s email, computer, and more! All along you’ll learn what steps you can take to reduce your association’s risk.

Learning Objectives

  1. Identify all areas of cybersecurity-related risk
  2. Understand how hackers select and hack a target
  3. Five actions CEOs can take to reduce cyber risk in their association

Dan Lautman

Dan Lautman has been working in the nonprofit and association sectors for more than 15 years, with more than a decade of experience in the information technology field. A Certified Ethical Hacker (CEH) and a member of the American Society of Association Executives (ASAE), Mr. Lautman works for DelCor Technology Solutions, where he provides IT consulting services to associations and non-profits in the realms of technology management, cybersecurity, network architecture, and cloud computing.