Institute

Results 1-14 of 14
Information Security Professional Panel Discussion

Information Security Professional Panel Discussion

June 20, 2024 - 2:00 PM CST | 1.5 CPE

Were taking a break from our regular, topical webinars to bring you a different type of webinar! We invited several IT and Information Security Professionals to discuss what strategic projects they have on tap for 2024 in a highly interactive panel. Our panelists will share some of their top cybersecurity-related concerns, their lessons learned from 2023, and their strategic projects for next year and beyond. We'll also open up the panel for questions from and discussion with our attendees. Dont miss this exciting opportunity to hear what other folks like you are working on in their environments and ask them questions!

Online
Price
$249
Member Price
$199

Enroll
Journey into the Maze of Multifactor Authentication

Journey into the Maze of Multifactor Authentication

May 15, 2024 - 2:00 PM CST | 1.5 CPE

Multi-Factor Authentication (MFA) is billed as one of the most impactful controls you can deploy to mitigate cyber risk, and rightfully so! But what exactly is this enigmatic MFA, and why is it the talk of the cybersecurity town? Prepare to embark on an exciting adventure, where we'll unravel the mysteries of MFA, exploring its importance, pros, cons, and the art of deploying it like a pro.

Online
Price
$249
Member Price
$199

Enroll
Getting to the Core of NIST CSF 2.0

Getting to the Core of NIST CSF 2.0

Recorded on March 13, 2024 | 1.5 CPE

John Helland takes a deep dive into the updated NIST Cybersecurity Framework (CSF). The NIST CSF 2.0 is a comprehensive and customizable guide for reducing cybersecurity risk for all types of organizations, regardless of their size, sector, or level of sophistication.This is for you if you use NIST CSFT or are looking at adopting this framework. Learn from an SBS cybersecurity professional how to leverage the CSF 2.0 to enhance your organizations cybersecurity posture and resilience.

Online
Price
$295
Member Price
$245

Enroll
Navigating the Cyber Insurance Landscape

Navigating the Cyber Insurance Landscape

Recorded on February 15, 2024 | 1.5 CPE

Today's cyber insurance world is still a bit like the wild west - it's always changing, it can be expensive, and different providers offer different types and limits. No insurance provider handles cyber insurance the same! However, cyber insurance has become an important element of today's insurance landscape, and the best carriers can provide a very valuable insurance product.

Online
Price
$249
Member Price
$199

Enroll
The Ultimate Guide to Microsoft 365 Security

The Ultimate Guide to Microsoft 365 Security

Recorded on April 17, 2024 | 1.5 CPE

Microsoft 365 is now used by over 1 million companies and boasts more than 345 million users globally. 78% of Microsoft 365 organizations are small businesses. Microsoft Office has long been a staple of the business world, but as we shift from hosting our data on-premises to the cloud, both the risks and rewards have changed.Your software is only as good as the security controls you implement to protect your organization. While Microsoft 365 introduces new and unique threats, new and innovative controls are also a strong benefit of this cloud-based productivity suite.

Online
Price
$249
Member Price
$199

Enroll
2024 Top Audit Recommendations

2024 Top Audit Recommendations

Recorded on March 20, 2024 | 1.5 CPE

Documenting anInformation Security Program (ISP) is an important step in protecting yourorganization from cyber threats, but its only as good as controls that youveactually implemented. Testing your controls to ensure youre doing what you sayyoure doing and what you're doing is adequate is the cornerstone to astrong ISP. The objective of a good IT Audit is to find areas of cybersecurityimprovement for your organization.a. SBS conducts over 500 audits per year across the US (primarily for financial institutions, but also includes businesses of all shapes, sizes, and industries). Christy Thomas shares the 10 most frequently recommended IT Audit findings from the past year, and how your organization can leverage these findings to get ahead of your next IT Audit.

Online
Price
$249
Member Price
$199

Enroll
Maintaining a Cyber-Savvy Culture

Maintaining a Cyber-Savvy Culture

Recorded on January 17, 2024 | 1.5 CPE

What price has your organization paid for having a mindset and belief that you arent on the radar of some cyber criminal? Does your business believe that hackers dont know who you are or where you are, or that youre not valuable enough to a hacker to matter? Thats exactly the cybersecurity culture a cyber criminal hopes you have, as opposed to the belief that cybersecurity is a critical element of keeping your business safe.Join Honey Shelton and dive into some real-world examples of the impact of cyber-incidents. Todays cyber threats demand proactive measures, what price have businesses paid for believing they are not on the radar of the cyber thug?

Online
Price
$249
Member Price
$199

Enroll
The Age of AI: The Risks and Rewards of AI for Business

The Age of AI: The Risks and Rewards of AI for Business

Recorded on December 20, 2023 | 1.5 CPE

In the ever-evolving business world, staying ahead of the curve is crucial, and Artificial Intelligence is the curve you need to conquer. But before you dive headfirst into the AI pool, let's take a deep dive into the rewards and risks of this game-changing technology.Join us for an insightful webinar where we'll explore the exciting possibilities of AI in business. We'll uncover how AI can transform your operations, from streamlining processes to optimizing decision-making. But don't worry, we won't sugarcoat it we'll also tackle the potential pitfalls and risks around AI, ensuring you're well-equipped to navigate those challenges as well.

Online
Price
$249
Member Price
$199

Enroll
FDIC InTREx Changes and their Impact on your next IT Exam

FDIC InTREx Changes and their Impact on your next IT Exam

Recorded on December 14, 2023 | 1.5 CPE

How will the recent changes and updates to the IT Risk Examination (InTREx) program impact your next IT Exam? Ensure you follow the new guidelines regarding third-party relationships, accountability, responsibility to meet these new reporting requirements.

Online
Price
$295
Member Price
$245

Enroll
Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Recorded on November 16, 2023 | 1.5 CPE

On average, an organization takes 287 days to detect and contain a data breach. Hackers today are very good at breaking into networks and staying undetected for long periods before executing their ultimate objectives. When a cyber incident inevitably occurs, your best bet is to assume your network is compromised and act accordingly rather than think youre not compromised and carry on as usual.One of the most important questions to ask yourself is: If a hacker was in my network, would I know? Testing your internal and external network security controls regularly is an important way to find the answer. But what happens if the Penetration Test has little or no success?Assumed-breach testing simulates the initial foothold an attacker might obtain, allowing for more in-depth testing and providing a unique perspective of the organizations readiness for a real-world breach. Assumed-breach testing helps answer the question of what can happen if we were breached?

Online
Price
$249
Member Price
$199

Enroll
Defending Your Business Against Business Email Compromise

Defending Your Business Against Business Email Compromise

Recorded on October 18, 2023 | 1.5 CPE

The two most common attack vectors that lead to Business Email Compromise (BEC) are Phishing Emails and Compromised Credentials. According to recent studies, an estimated 3.4 BILLION phishing emails are sent daily. Additionally, the average internet user has approximately 100 different passwords to remember, which often leads to credential reuse. Those are some heaving things working against the average user, especially regarding email account compromise. Unfortunately, we've seen many organizations have their business email accounts compromised through credential reuse. Business Email Compromise (BEC) can lead to propagating further BEC attacks and a full-blown data breach and network compromise. In this session, we'll walk through a real-world case study of a BEC attack, how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your organization.

Online
Price
$249
Member Price
$199

Enroll
Remote Work: Secure Your Devices and Data from Anywhere

Remote Work: Secure Your Devices and Data from Anywhere

Recorded on September 20, 2023 | 1.5 CPE

If the pandemic taught us anything, it is that the workforce of the future is embracing remote and mobile work like never before! During the pandemic, most organizations were forced to quickly figure out how to enable remote work. Speed and convenience often trumped security.As the remote work revolution continues, safeguarding our business data, employees, and customers from the ever-evolving cyber threats becomes paramount. A coffee shop, airport, beach, or their own homesall these locations are now part of your corporate network.Join us for this engaging webinar and discuss with cyber experts how to protect your organization's digital landscape and your remote workers.

Online
Price
$249
Member Price
$199

Enroll
Crafting Your Ultimate Incident Response Strategy

Crafting Your Ultimate Incident Response Strategy

Recorded on August 16, 2023 | 1.5 CPE

In today's cybersecurity landscape, it is no longer possible to assume that our organization will never be compromised. It is not a question of if a cyber incident will occur, but when. As an IT/IS professional or executive, you don't want to be staring down a major cyber incident without a strong Incident Response Plan that's been thoughtfully crafted, reviewed, and tested.Don't miss our power-packed webinar on building an effective Incident Response Plan. We'll equip you with essential tips and strategies for building a robust IRP so you can handle any type of cyber incident thrown your way.

Online
Price
$249
Member Price
$199

Enroll
New Interagency Guidance on Third-Party Relationships: Risk Management - What You MUST Know!

New Interagency Guidance on Third-Party Relationships: Risk Management - What You MUST Know!

Recorded on July 12, 2023 | 1.5 CPE

It has been a minute since financial institutions received new regulatory guidance on vendor management! The original guidance from the FDIC (FIL 44-2008) is old enough to drive. The most recent vendor management guidance from the OCC (Bulletin 2013-20) and FRB (SR 13-19) are in double digits. Good news! Those guidelines have been rescinded and are replaced with ONE joint interagency playbook on vendor management: The Interagency Guidance on Third-Party Relationships: Risk Management.

Online
Price
$295
Member Price
$199

Enroll