Hacker Hour

Results 1-32 of 32
Hacker Hour: Suspicious Activity Reports - Reporting Cyber Events

Hacker Hour: Suspicious Activity Reports - Reporting Cyber Events

Recorded on November 22, 2024 | 1 CPE

Financial institutions face several challenges when completing Suspicious Activity Reports (SARs) for cyber events. Join us for a step-by-step guide on how to fill out SARs, addressing common issues such as identifying suspicious activities, ensuring accuracy, and meeting regulatory deadlines.We will also explore key compliance obligations and highlight the essential role that IT plays in detecting, reporting, and mitigating cyber events, emphasizing the importance of effective collaboration between compliance and IT teams.This webinar is ideal for compliance officers, IT professionals, risk management teams, and anyone involved in cybersecurity and regulatory compliance.

Hacker Hour: Leveraging Artificial Intelligence

Hacker Hour: Leveraging Artificial Intelligence

Recorded on October 30, 2024 | 1 CPE

Join us as we dive into the exciting world of AI! We'll chat about potential challenges and share some simple, friendly tips for using AI responsibly. We can't wait to explore this together!

Hacker Hour: The Cybersecurity Culture Checklist

Hacker Hour: The Cybersecurity Culture Checklist

Recorded on September 26, 2024 | 1 CPE

Join us and walk through a cybersecurity culture checklist to help you measure and improve your organizations cybersecurity culture. Well explore key strategies for embedding these practices into your business, moving you closer to a cyber-savvy culture.

Hacker Hour: Unveiling the Most Common Findings in Penetration Testing

Hacker Hour: Unveiling the Most Common Findings in Penetration Testing

Recorded on August 28, 2024 | 1 CPE

Join us for an insightful webinar where we delve into the most common findings in penetration testing and offer proactive solutions to fortify your network before your next penetration test.

Hacker Hour: Harnessing the Value of Data Flow Diagrams

Hacker Hour: Harnessing the Value of Data Flow Diagrams

Recorded on July 24, 2024 | 1 CPE

We discuss essential inputs and outputs of a good data flow diagram and work our way through the challenges of creating and interpreting them. We analyze some real-life examples to ensure you have a solid foundation to enhance your data flow diagrams.

Hacker Hour: Understanding Data Brokers and Protecting Privacy

Hacker Hour: Understanding Data Brokers and Protecting Privacy

Recorded on June 18, 2024 | 1 CPE

Join us for a compelling session with Chris Wingfield, the esteemed Managing Director of Cyber Threat Intelligence at 360 Privacy. Well delve into strategies for diminishing your cybersecurity risks by minimizing your digital footprint. Discover how to safeguard your privacy and fortify your defenses in the digital realm.

Hacker Hour: Quantum Computing 101

Hacker Hour: Quantum Computing 101

Recorded on May 29, 2024 | 1 CPE

Join us for an overview of quantum computing, its potential applications in the financial sector, and how organizations can assess the benefits and risks of this technology.

Hacker Hour: Strengthening Cybersecurity in Business Banking Customers

Hacker Hour: Strengthening Cybersecurity in Business Banking Customers

Recorded on April 30, 2024 | 1 CPE

Explore the latest in cybersecurity education and risk management techniques, which can help create a stronger security mindset among business customers.

Hacker Hour: Advancing Your Penetration Testing Program

Hacker Hour: Advancing Your Penetration Testing Program

Recorded on March 28, 2024 | 1 CPE

Discuss the various industry recommendations and the process of starting and maturing a penetration testing program.

Hacker Hour: Documents to Review a Critical Vendor

Hacker Hour: Documents to Review a Critical Vendor

Recorded on February 29, 2024 | 1 CPE

Delve into the importance of vendor management governance, vendor selection, and vendor risk assessment. We will guide you through the key documents that you need to assess when working with a critical vendor. Dont miss this opportunity to learn from industry experts and enhance your vendor management program.

Hacker Hour: The 5 Most Critical Roles of an Information Security Officer

Hacker Hour: The 5 Most Critical Roles of an Information Security Officer

Recorded on January 31, 2024 | 1 CPE

The role of an information security officer is not for the faint-hearted. It is a job that is never finished and seldom receives the recognition it deserves. Yet, it is one of the most crucial roles in any organization. In this webinar, we will discuss the top 5 critical responsibilities that an information security officer must develop and cultivate to create a secure culture and reduce the likelihood of a cyber incident.

Hacker Hour: Table Top Testing - Putting Risk on the Table

Hacker Hour: Table Top Testing - Putting Risk on the Table

Recorded on December 27, 2023 | 1 CPE

Tabletop exercises are a powerful way to test and improve your organizations readiness for any emergency or disaster. However, there are some common challenges and pitfalls in tabletop testing that can lessen the value of such exercises. Join SBS as we discuss how to overcome some of the most common challenges, design a tabletop exercise to match your organization, and review some of the best practices for risk management.Dont miss this opportunity to learn how to put risk on the table and prepare your organization for any crisis.

Hacker Hour: What's Hot in Social Engineering

Hacker Hour: What's Hot in Social Engineering

Recorded on November 29, 2023 | 1 CPE

Social engineering is the art of manipulating people into performing actions or divulging confidential information. It is one of the most common and effective methods of cyberattacks, as it exploits human psychology rather than technical vulnerabilities.In this webinar, you will learn about the latest trends and techniques in social engineering, such as phishing, vishing, and smishing. You will also learn how to protect your organization and customers from these emerging threats.

Hacker Hour: Four Critical Risk Assessments Organizations Should Get Good At

Hacker Hour: Four Critical Risk Assessments Organizations Should Get Good At

Recorded on October 25, 2023 | 1 CPE

With the world becoming more and more connected, it's becoming increasingly important to prioritize the safety of your sensitive data and information. To truly protect your organization, it's essential to take a proactive approach to assessing and managing risks. Join our upcoming webinar to learn about four key risk assessments that can take your information security to the next level.

Hacker Hour: How Bad Guys Bypass MFA

Hacker Hour: How Bad Guys Bypass MFA

Recorded on September 27, 2023 | 1 CPE

In today's digital landscape, Multi-Factor Authentication (MFA) is hailed as the security gold standard. However, is it possible that even this powerful defense can be compromised? It's time to dive into the tactics, techniques, and tools that cybercriminals use to outsmart MFA.

Hacker Hour: AI Unveiled-Tackling the Early Risks of AI Technology

Hacker Hour: AI Unveiled-Tackling the Early Risks of AI Technology

Recorded on August 29, 2023 | 1 CPE

Are you ready to dive into the exciting world of artificial intelligence (AI) or is fear of the unknown holding you back? Join us for a thought-provoking webinar where we'll explore the early risks associated with AI technology adoption. With AI transforming industries and societies at lightning speed, it's crucial to understand and address potential downfalls. Get ready to learn about the current state of AI, potential risks, and strategies to mitigate these risks in your business.

Hacker Hour: 5 Business Challenges That Executives Overlook as the Business Grows

Hacker Hour: 5 Business Challenges That Executives Overlook as the Business Grows

Recorded on July 26, 2023 | 1 CPE

Every business executive knows that growth is essential for survival, but with it come many challenges. Among these, cybersecurity risk management stands out as a paramount concern that can make or break your growth journey. Join our host, Nick, and his guest Shane Daniel, Information Security Consulting - Team Lead at SBS, to gain strategies and actionable steps that your business can implement right away to forge a secure path towards growth, safeguarding your company every step of the way!

Hacker Hour: SOC2 Report Reviews: Strategies and Best Practices

Hacker Hour: SOC2 Report Reviews: Strategies and Best Practices

Recorded on June 28, 2023 | 1 CPE

Whether you're new to SOC 2 report reviews or have experience, this webinar will provide valuable insights to help you effectively review and validate SOC 2 reports. Join us to learn from industry experts and ensure your organization effectively manages third-party risks. We will cover the key aspects of SOC 2 reports, the scope of the review, and the key elements of the report.

Hacker Hour: M365 Email Account Compromise Triage

Hacker Hour: M365 Email Account Compromise Triage

Recorded on May 31, 2023 | 1 CPE

Email account compromises are a common and growing threat to organizations, and Microsoft 365 (M365) environments are not immune to these attacks. If an email account compromise targets your organization, it is crucial to respond quickly and effectively to mitigate the damage. Join our host, Nick, and his guest, Dylan Kreutzfeldt, Information Security Consultant at SBS, to learn best practices and strategies to initially respond to an assumed email account compromise within the M365 environment.

Hacker Hour: External Penetration Testing

Hacker Hour: External Penetration Testing

Recorded on April 26, 2023 | 1 CPE

Whether you are a cybersecurity professional, IT manager, or business owner, this webinar will provide valuable insights into the world of external penetration testing and how it can help your organization stay ahead of potential threats. Join our host, Nick, and his guest Bryan Barnes, Director Network Security at SBS, to learn more!

Hacker Hour: 3 Critical Components To Vendor Management

Hacker Hour: 3 Critical Components To Vendor Management

Recorded on March 29, 2023 | 1 CPE

An engaging discussion on the three critical components of vendor management - vendor classification/risk assessment, vendor reviews, and vendor monitoring. During this webinar, you'll learn how to establish a successful vendor management program for your organization, including tips on evaluating potential vendors, assessing current vendors, and the importance of ongoing monitoring of vendor performance.

Hacker Hour: Internal Network Penetration Testing

Hacker Hour: Internal Network Penetration Testing

Recorded on February 23, 2023 | 1 CPE

Sparked by continued growth in the sheer number of attacks and the sophistication of cybercriminal techniques, internal penetration testing has become a very necessary exercise to identify vulnerabilities, protect from insider threats, and strengthen the overall security posture of the business. Join Nick Podhradsky and Bryan Barnes as they answer many of the most common questions about internal penetration testing.

Hacker Hour: Responding to Common Cyber Incidents

Hacker Hour: Responding to Common Cyber Incidents

Recorded on January 25, 2023 | 1 CPE

Nick Podhradsky shares his insights into the current state of information security. What findings, recommendations, and possible changes to the future of auditing are trending? Nick also offers practical advice and best practices for professionals looking to stay up-to-date and remain competitive in their field.

Hacker Hour: What's Trending in the World of IT Audit?

Hacker Hour: What's Trending in the World of IT Audit?

Recorded on December 28, 2022 | 1 CPE

IT auditing is a vital component in making empowered business decisions. As such, it is important to understand the latest developments and advancements in the information and cybersecurity field and how they affect your audit results. We share insights into the current state of information security, what's trending regarding findings and recommendations, and possible changes to the future of auditing. We will also offer practical advice and best practices for professionals looking to stay up-to-date and remain competitive in the field.

Hacker Hour: Review of 2022 Top Cybersecurity Threats

Hacker Hour: Review of 2022 Top Cybersecurity Threats

Recorded on November 23, 2022 | 1 CPE

Prepare for the future by learning from this challenging year in cybersecurity. Nick Podhradsky reviews the top cyber threats of 2022 with a focus on the lessons to begin 2023 with a healthy and proactive cyber mindset.

Hacker Hour: Cybersecurity Awareness Month Roundtable

Hacker Hour: Cybersecurity Awareness Month Roundtable

Recorded on October 26, 2022 | 1 CPE

We celebrate National Cybersecurity Awareness Month with a security awareness round table. In this Hacker Hour we share our best tips and tricks to train employees, customers, senior management/board, and your family on everything cybersecurity.

Hacker Hour: Changes in Regulation Guidance

Hacker Hour: Changes in Regulation Guidance

ecorded on September 29, 2023 | 1 CPE

FDIC, FFIEC, and FTC; All three big players have made recent changes to their guidance. Tackle the challenge to stay current with the regulatory landscape as we discect the FDIC Incident Notification Rule, FFIEC AIO booklet, and FTC changes for GLBA.

Hacker Hour: Locking Down Microsoft365 Security

Hacker Hour: Locking Down Microsoft365 Security

Recorded on August 30, 2022 | 1 CPE

Microsoft 365 now has more than 180 million monthly active users. If your organization has implemented or researched Microsoft 365, this information is essential to understand which controls need to be modified to lock down the security posture of your environment.

Hacker Hour: Revisiting the FFIEC Cybersecurity Assessment Tool

Hacker Hour: Revisiting the FFIEC Cybersecurity Assessment Tool

Recorded on July 20, 2022 | 1 CPE

The FFIEC Cybersecurity Assessment Tool (CAT) has been around for seven years since its release in the summer of 2015. The tool has spurred many questions about its value. In this Hacker Hour, we demystify the tool, cover some of the missed questions to evolve your cyber maturity, and show how you can get the most out of your FFIEC CAT data.

Hacker Hour: Introduction to Zero Trust

Hacker Hour: Introduction to Zero Trust

Recorded on May 17, 2022 | 1 CPE

One of the industry's hottest buzzwords, zero trust is an evolving security framework with the premise that trust is never granted implicitly but must be continually evaluated. What does that mean? We break down the principles and how a zero-trust framework can prevent data breaches, limit internal lateral movement, and improve an organization's security posture.

Hacker Hour: Success Stories from the SBS Hacking Team

Hacker Hour: Success Stories from the SBS Hacking Team

Recorded on April 28, 2022 | 1 CPE

One way SBS helps organizations build a strong security posture is proactive network security testing. Take a look at some of the most successful attack scenarios through the eyes of our SBS NetSec team. Full of actionable takeaways to apply to your environment for increased protection!

Hacker Hour: What to Expect in Your Next IT Exam/IT Audit

Hacker Hour: What to Expect in Your Next IT Exam/IT Audit

Recorded on March 30, 2022 | 1 CPE

IT audits or exams help organizations mature, achieve compliance, and adopt a proactive security mindset. Nick Podhradsky covers the top five exam recommendations and opens the discussion on findings that are popping up around the country.