Press Alt+1 for screen-reader mode, Alt+0 to cancelAccessibility Screen-Reader Guide, Feedback, and Issue Reporting | New window
Get 20% Off Your First Purchase — Use Code FIRST20 at Checkout

When Bots Attack! Safeguarding Against AI Cyber Threats

Presented by Tom Kirkham

(1,686 Ratings)
LexVid

Watch This Course for Free!

New LexVid members can watch their 1st course for free. No credit card needed, just create an account and you'll receive your certificate immediately after watching your free course.

Already a member? Sign in
Video Player is loading.
Loaded: 0%
Current Time 0:00

Course Description

Length: 1h 3min    Published: 3/12/2025    
In the webinar "When Bots Attack: Safeguarding Against AI Cyber Threats," expert and best-selling author, Tom Kirkham, delves into the evolving landscape of AI-driven cyber threats and the sophisticated tactics employed by malicious bots. Attendees will gain insights into the latest defense mechanisms and strategies for protecting digital assets and personal information against these advanced threats. The session aims to empower individuals and organizations with the knowledge and tools needed to stay one step ahead in the ever-changing battle against cybercriminals leveraging artificial intelligence.
Learning Objectives
* Learn about the latest developments in AI-driven cyber threats, including how malicious bots operate and evolve
* Explore cutting-edge defense strategies and mechanisms to protect against AI cyber threats
* Learn how to implement a security-first culture within their organization and develop effective training programs using AI
Read the course transcript.

Speaker Q&A

Question
We had a ransomeware attack on our firm which paralyzed us . What can we do to prevent this from happening. Small firm.
- SusanH
Answer
I’m sorry you experienced that. Ransomware can be crippling for a small firm — but it’s preventable with the right layers in place. For most small firms, protection comes down to five essentials: 1. Multi-Factor Authentication (MFA) on email and all critical systems. 2. Consistent patching of operating systems, firewalls, and third-party apps. 3. Secure remote access (no exposed RDP; use secure VPN or zero-trust solutions). 4. Endpoint Detection & Response (EDR) — traditional antivirus is no longer enough. 5. Proper backups following the 3-2-1 rule, including one offline or immutable copy — and regularly tested restores. Most ransomware starts with phishing or stolen credentials. Layered protection, visibility, and proactive monitoring are what stop it before it spreads. If you’ve already had an incident, I strongly recommend a post-attack review to determine exactly how access was gained and close that gap permanently. For small firms without dedicated security teams, partnering with a cybersecurity-focused MSP/MSSP can make a significant difference. Whether it’s us or another reputable provider, having proactive monitoring, structured security controls, and an incident response plan in place is critical. Prevention is far less expensive than recovery.
- Tom Kirkham

Presented By:

Tom Kirkham

Fayetteville, Arkansas

479.242.2804

kindsey.haynes@irontechsecurity.com

Featured Reviews