Webinar

Industry Leaders

About Our Experts

Colin Whittaker

Founder & Director at Informed Risk Decisions Ltd
Colin is a leading payments security expert with extensive experience shaping global risk strategy. A former PCI SSC Board of Advisors member, he drove major security and compliance initiatives at APACS and Visa Europe. Now an independent consultant, he advises diverse organizations and frequently speaks and publishes on cybersecurity and information risk.

Jeff Warren

Chief Technology Officer at Netwrix
Jeff is the Chief Technology Officer at Netwrix, bringing extensive experience in product management and software development. He previously led product strategy at Stealthbits Technologies and began his career as a software engineer. Jeff now oversees the full Netwrix product portfolio. He holds a BS in Information Systems from the University of Delaware.

Joseph Carson

Chief Security Scientist (CSS) & Advisory CISO at Delinea
With over 25 years of experience in enterprise security, Joseph specializes in blockchain, endpoint, network, application security, virtualization, access controls, and privileged account management. An award-winning ethical hacker and CISSP, he actively contributes to global cybersecurity discussions, frequently speaking at conferences and publishing insights in leading industry outlets.

Roger A. Grimes

Data-Driven Defense Evangelist at KnowBe4, Inc
Roger has 34 years of computer security experience, authoring 13 books and over 1,300 articles. Renowned for his data-driven approach to defense, he has presented at major global security conferences and has been featured in Newsweek™, NPR, and the Wall Street Journal, providing expert insights on cybersecurity trends, best practices, and emerging threats.

Darren Manners

Founder of RedSpy365®
Darren brings decades of expertise in penetration testing, security awareness, social engineering, and offensive cybersecurity practices. With early experience in naval intelligence, he has achieved elite certifications such as SANS GSE, CCIE Security, OSCP, and CISSP. Darren also designed innovative security tools, including Sphere of Influence and Ice-hole, enhancing cybersecurity analysis and testing.

Think Like a Hacker: Tactics to Identify Gaps in Your IT Security Posture

Mar 16 / IT GRC Forum

In today’s rapidly evolving digital landscape, cybersecurity remains a top concern for organizations of all sizes. Hackers are constantly developing new methods to exploit vulnerabilities, making it critical for businesses to adopt proactive strategies. Understanding security from a hacker’s perspective is one of the most effective ways to identify and address potential risks before they become threats.


Join our expert-led webinar to learn actionable strategies for uncovering and closing security gaps in your IT infrastructure. Attendees will discover how to conduct comprehensive system investigations using footprinting techniques, run penetration tests to detect vulnerabilities, and perform gap analyses to mitigate risks across both internal systems and third-party vendors.


Additionally, the session will explore best practices for fostering a strong cybersecurity culture through employee security awareness training, reducing human-related risks. By adopting these hacker-informed strategies, organizations can strengthen their defenses, safeguard sensitive information, and improve overall cybersecurity posture. Don’t miss this opportunity to stay ahead of cyber threats and protect your critical assets.