Hacker Hour

Results 21-30 of 32
Hacker Hour: 3 Critical Components To Vendor Management

Hacker Hour: 3 Critical Components To Vendor Management

Recorded on March 29, 2023 | 1 CPE

An engaging discussion on the three critical components of vendor management - vendor classification/risk assessment, vendor reviews, and vendor monitoring. During this webinar, you'll learn how to establish a successful vendor management program for your organization, including tips on evaluating potential vendors, assessing current vendors, and the importance of ongoing monitoring of vendor performance.

Hacker Hour: Internal Network Penetration Testing

Hacker Hour: Internal Network Penetration Testing

Recorded on February 23, 2023 | 1 CPE

Sparked by continued growth in the sheer number of attacks and the sophistication of cybercriminal techniques, internal penetration testing has become a very necessary exercise to identify vulnerabilities, protect from insider threats, and strengthen the overall security posture of the business. Join Nick Podhradsky and Bryan Barnes as they answer many of the most common questions about internal penetration testing.

Hacker Hour: Responding to Common Cyber Incidents

Hacker Hour: Responding to Common Cyber Incidents

Recorded on January 25, 2023 | 1 CPE

Nick Podhradsky shares his insights into the current state of information security. What findings, recommendations, and possible changes to the future of auditing are trending? Nick also offers practical advice and best practices for professionals looking to stay up-to-date and remain competitive in their field.

Hacker Hour: What's Trending in the World of IT Audit?

Hacker Hour: What's Trending in the World of IT Audit?

Recorded on December 28, 2022 | 1 CPE

IT auditing is a vital component in making empowered business decisions. As such, it is important to understand the latest developments and advancements in the information and cybersecurity field and how they affect your audit results. We share insights into the current state of information security, what's trending regarding findings and recommendations, and possible changes to the future of auditing. We will also offer practical advice and best practices for professionals looking to stay up-to-date and remain competitive in the field.

Hacker Hour: Review of 2022 Top Cybersecurity Threats

Hacker Hour: Review of 2022 Top Cybersecurity Threats

Recorded on November 23, 2022 | 1 CPE

Prepare for the future by learning from this challenging year in cybersecurity. Nick Podhradsky reviews the top cyber threats of 2022 with a focus on the lessons to begin 2023 with a healthy and proactive cyber mindset.

Hacker Hour: Cybersecurity Awareness Month Roundtable

Hacker Hour: Cybersecurity Awareness Month Roundtable

Recorded on October 26, 2022 | 1 CPE

We celebrate National Cybersecurity Awareness Month with a security awareness round table. In this Hacker Hour we share our best tips and tricks to train employees, customers, senior management/board, and your family on everything cybersecurity.

Hacker Hour: Changes in Regulation Guidance

Hacker Hour: Changes in Regulation Guidance

ecorded on September 29, 2023 | 1 CPE

FDIC, FFIEC, and FTC; All three big players have made recent changes to their guidance. Tackle the challenge to stay current with the regulatory landscape as we discect the FDIC Incident Notification Rule, FFIEC AIO booklet, and FTC changes for GLBA.

Hacker Hour: Locking Down Microsoft365 Security

Hacker Hour: Locking Down Microsoft365 Security

Recorded on August 30, 2022 | 1 CPE

Microsoft 365 now has more than 180 million monthly active users. If your organization has implemented or researched Microsoft 365, this information is essential to understand which controls need to be modified to lock down the security posture of your environment.

Hacker Hour: Revisiting the FFIEC Cybersecurity Assessment Tool

Hacker Hour: Revisiting the FFIEC Cybersecurity Assessment Tool

Recorded on July 20, 2022 | 1 CPE

The FFIEC Cybersecurity Assessment Tool (CAT) has been around for seven years since its release in the summer of 2015. The tool has spurred many questions about its value. In this Hacker Hour, we demystify the tool, cover some of the missed questions to evolve your cyber maturity, and show how you can get the most out of your FFIEC CAT data.

Hacker Hour: Introduction to Zero Trust

Hacker Hour: Introduction to Zero Trust

Recorded on May 17, 2022 | 1 CPE

One of the industry's hottest buzzwords, zero trust is an evolving security framework with the premise that trust is never granted implicitly but must be continually evaluated. What does that mean? We break down the principles and how a zero-trust framework can prevent data breaches, limit internal lateral movement, and improve an organization's security posture.