Hacker Hour

Results 21-25 of 25
Hacker Hour: Locking Down Microsoft365 Security

Hacker Hour: Locking Down Microsoft365 Security

Recorded on August 30, 2022 | 1 CPE

Microsoft 365 now has more than 180 million monthly active users. If your organization has implemented or researched Microsoft 365, this information is essential to understand which controls need to be modified to lock down the security posture of your environment.

Hacker Hour: Revisiting the FFIEC Cybersecurity Assessment Tool

Hacker Hour: Revisiting the FFIEC Cybersecurity Assessment Tool

Recorded on July 20, 2022 | 1 CPE

The FFIEC Cybersecurity Assessment Tool (CAT) has been around for seven years since its release in the summer of 2015. The tool has spurred many questions about its value. In this Hacker Hour, we demystify the tool, cover some of the missed questions to evolve your cyber maturity, and show how you can get the most out of your FFIEC CAT data.

Hacker Hour: Introduction to Zero Trust

Hacker Hour: Introduction to Zero Trust

Recorded on May 17, 2022 | 1 CPE

One of the industry's hottest buzzwords, zero trust is an evolving security framework with the premise that trust is never granted implicitly but must be continually evaluated. What does that mean? We break down the principles and how a zero-trust framework can prevent data breaches, limit internal lateral movement, and improve an organization's security posture.

Hacker Hour: Success Stories from the SBS Hacking Team

Hacker Hour: Success Stories from the SBS Hacking Team

Recorded on April 28, 2022 | 1 CPE

One way SBS helps organizations build a strong security posture is proactive network security testing. Take a look at some of the most successful attack scenarios through the eyes of our SBS NetSec team. Full of actionable takeaways to apply to your environment for increased protection!

Hacker Hour: What to Expect in Your Next IT Exam/IT Audit

Hacker Hour: What to Expect in Your Next IT Exam/IT Audit

Recorded on March 30, 2022 | 1 CPE

IT audits or exams help organizations mature, achieve compliance, and adopt a proactive security mindset. Nick Podhradsky covers the top five exam recommendations and opens the discussion on findings that are popping up around the country.