Press Alt+1 for screen-reader mode, Alt+0 to cancelAccessibility Screen-Reader Guide, Feedback, and Issue Reporting | New window
All CLE Packages On Sale Now — Ends 4/17 (No Code Needed)

When Bots Attack! Safeguarding Against AI Cyber Threats

Presented by Tom Kirkham

(4,278 Ratings)
LexVid

Watch This Course for Free!

New LexVid members can watch their 1st course for free. No credit card needed, just create an account and you'll receive your certificate immediately after watching your free course.

Already a member? Sign in
Video Player is loading.
Loaded: 0%
Current Time 0:00

Course Description

Length: 1h 3min    Published: 3/12/2025    
In the webinar "When Bots Attack: Safeguarding Against AI Cyber Threats," expert and best-selling author, Tom Kirkham, delves into the evolving landscape of AI-driven cyber threats and the sophisticated tactics employed by malicious bots. Attendees will gain insights into the latest defense mechanisms and strategies for protecting digital assets and personal information against these advanced threats. The session aims to empower individuals and organizations with the knowledge and tools needed to stay one step ahead in the ever-changing battle against cybercriminals leveraging artificial intelligence.
Learning Objectives
* Learn about the latest developments in AI-driven cyber threats, including how malicious bots operate and evolve
* Explore cutting-edge defense strategies and mechanisms to protect against AI cyber threats
* Learn how to implement a security-first culture within their organization and develop effective training programs using AI
Read the course transcript.

Speaker Q&A

Question
We had a ransomeware attack on our firm which paralyzed us . What can we do to prevent this from happening. Small firm.
- SusanH
Answer
I’m sorry you experienced that. Ransomware can be crippling for a small firm — but it’s preventable with the right layers in place. For most small firms, protection comes down to five essentials: 1. Multi-Factor Authentication (MFA) on email and all critical systems. 2. Consistent patching of operating systems, firewalls, and third-party apps. 3. Secure remote access (no exposed RDP; use secure VPN or zero-trust solutions). 4. Endpoint Detection & Response (EDR) — traditional antivirus is no longer enough. 5. Proper backups following the 3-2-1 rule, including one offline or immutable copy — and regularly tested restores. Most ransomware starts with phishing or stolen credentials. Layered protection, visibility, and proactive monitoring are what stop it before it spreads. If you’ve already had an incident, I strongly recommend a post-attack review to determine exactly how access was gained and close that gap permanently. For small firms without dedicated security teams, partnering with a cybersecurity-focused MSP/MSSP can make a significant difference. Whether it’s us or another reputable provider, having proactive monitoring, structured security controls, and an incident response plan in place is critical. Prevention is far less expensive than recovery.
- Tom Kirkham
Question
What do you suggest that individuals do to protect their home computer systems (where they access and/or store bank, brokerage and PI)? Thanks. BW
- BethW
Answer
The biggest mistake individuals make is assuming basic antivirus and a strong password are enough. They are not. At a minimum, I recommend focusing on five core areas: First, enable multi-factor authentication (MFA) on all critical accounts, especially email, banking, and brokerage. Email is the gateway. If that is compromised, everything else follows. Second, use a reputable password manager and ensure every account has a unique, complex password. Password reuse is still one of the most common causes of account compromise. Third, keep systems and software fully up to date. Most successful attacks exploit known vulnerabilities that already have patches available. Fourth, implement endpoint protection that goes beyond traditional antivirus. Modern threats, especially those leveraging AI and social engineering, are designed to bypass legacy tools. Fifth, maintain reliable backups of important data, stored separately (cloud or offline). This protects against ransomware and system failure. Equally important is awareness. Many attacks today are not technical—they rely on convincing the user to click, download, or provide access. Be cautious with unsolicited emails, links, and attachments, even if they appear legitimate. Security at home should be treated with the same seriousness as in a business environment, especially when financial and personal information is involved.
- Tom Kirkham

Presented By:

Tom Kirkham

Fayetteville, Arkansas

479.242.2804

kindsey.haynes@irontechsecurity.com

Featured Reviews

"This is the most important seminar for my law practice, and thank you so much for indicating the real security challenge going forward. Your presentation is so very informative and important, thank you so much for this production."

   Michael O

"Exceptional presentation. This space has clearly become a lot more dangerous in the last few years. A lot of 'food for thought' here. Thank you !!"

   Hans U

"Best presentation I've seen on LexVid. Very interesting course. "

   Matthew M

"This was the most beneficial and relatable CLE course I've taken so far. Instructor, presentation, knowledge, and importance of subject were all top notch. "

   Anthony H