Hacker Hour

Results 1-10 of 27
Hacker Hour: Understanding Data Brokers and Protecting Privacy

Hacker Hour: Understanding Data Brokers and Protecting Privacy

Recorded on June 18, 2024 | 1 CPE

Join us for a compelling session with Chris Wingfield, the esteemed Managing Director of Cyber Threat Intelligence at 360 Privacy. Well delve into strategies for diminishing your cybersecurity risks by minimizing your digital footprint. Discover how to safeguard your privacy and fortify your defenses in the digital realm.

Hacker Hour: Quantum Computing 101

Hacker Hour: Quantum Computing 101

Recorded on May 29, 2024 | 1 CPE

Join us for an overview of quantum computing, its potential applications in the financial sector, and how organizations can assess the benefits and risks of this technology.

Hacker Hour: Strengthening Cybersecurity in Business Banking Customers

Hacker Hour: Strengthening Cybersecurity in Business Banking Customers

Recorded on April 30, 2024 | 1 CPE

Explore the latest in cybersecurity education and risk management techniques, which can help create a stronger security mindset among business customers.

Hacker Hour: Advancing Your Penetration Testing Program

Hacker Hour: Advancing Your Penetration Testing Program

Recorded on March 28, 2024 | 1 CPE

Discuss the various industry recommendations and the process of starting and maturing a penetration testing program.

Hacker Hour: Documents to Review a Critical Vendor

Hacker Hour: Documents to Review a Critical Vendor

Recorded on February 29, 2024 | 1 CPE

Delve into the importance of vendor management governance, vendor selection, and vendor risk assessment. We will guide you through the key documents that you need to assess when working with a critical vendor. Dont miss this opportunity to learn from industry experts and enhance your vendor management program.

Hacker Hour: The 5 Most Critical Roles of an Information Security Officer

Hacker Hour: The 5 Most Critical Roles of an Information Security Officer

Recorded on January 31, 2024 | 1 CPE

The role of an information security officer is not for the faint-hearted. It is a job that is never finished and seldom receives the recognition it deserves. Yet, it is one of the most crucial roles in any organization. In this webinar, we will discuss the top 5 critical responsibilities that an information security officer must develop and cultivate to create a secure culture and reduce the likelihood of a cyber incident.

Hacker Hour: Table Top Testing - Putting Risk on the Table

Hacker Hour: Table Top Testing - Putting Risk on the Table

Recorded on December 27, 2023 | 1 CPE

Tabletop exercises are a powerful way to test and improve your organizations readiness for any emergency or disaster. However, there are some common challenges and pitfalls in tabletop testing that can lessen the value of such exercises. Join SBS as we discuss how to overcome some of the most common challenges, design a tabletop exercise to match your organization, and review some of the best practices for risk management.Dont miss this opportunity to learn how to put risk on the table and prepare your organization for any crisis.

Hacker Hour: What's Hot in Social Engineering

Hacker Hour: What's Hot in Social Engineering

Recorded on November 29, 2023 | 1 CPE

Social engineering is the art of manipulating people into performing actions or divulging confidential information. It is one of the most common and effective methods of cyberattacks, as it exploits human psychology rather than technical vulnerabilities.In this webinar, you will learn about the latest trends and techniques in social engineering, such as phishing, vishing, and smishing. You will also learn how to protect your organization and customers from these emerging threats.

Hacker Hour: Four Critical Risk Assessments Organizations Should Get Good At

Hacker Hour: Four Critical Risk Assessments Organizations Should Get Good At

Recorded on October 25, 2023 | 1 CPE

With the world becoming more and more connected, it's becoming increasingly important to prioritize the safety of your sensitive data and information. To truly protect your organization, it's essential to take a proactive approach to assessing and managing risks. Join our upcoming webinar to learn about four key risk assessments that can take your information security to the next level.

Hacker Hour: How Bad Guys Bypass MFA

Hacker Hour: How Bad Guys Bypass MFA

Recorded on September 27, 2023 | 1 CPE

In today's digital landscape, Multi-Factor Authentication (MFA) is hailed as the security gold standard. However, is it possible that even this powerful defense can be compromised? It's time to dive into the tactics, techniques, and tools that cybercriminals use to outsmart MFA.