Institute

Results 1-35 of 35
Top Audit Recommendations for 2025

Top Audit Recommendations for 2025

February 12, 2025 - 2:00 PM CST | 1.5 CPE

In today's digital age, ensuring the security of your data is paramount. Performing an IT audit to validate your Information Security Program controls isn't just a checkbox exercise - it's a critical step to safeguard your organization's most valuable asset: its data. SBS' very own IT Audit Manager, Christy Thomas, will reveal the most frequent findings, share real-world examples, and provide actionable tips to fortify your defenses and protect your organization.SBS conducts over 500 audits per year across the US (primarily for financial institutions, but also includes businesses of all shapes, sizes, and industries). In this session, we'll share the 10 most frequently recommended IT Audit findings over the past year, and how your organization can leverage these findings to get ahead of your next IT Audit.

Online
Price
$249
Member Price
$199

Enroll
Network Security 2025 – How and What to Test

Network Security 2025 – How and What to Test

March 19, 2025 - 2:00 PM CST | 1.5 CPE

If you use the internet to do business, and your employee and customers can access your technology from the internet remember, so can a hacker! While hackers might not be specifically targeting your business, they are specifically targeting vulnerable networks, web applications, websites, and anything else they can see from the internet. Be sure you know your online technology is secure before a hacker shows you otherwise!SBS conducts nearly 1000 Network Security engagements per year across the US, ranging from individual PenTests or Vulnerability Assessments s to full-blown Red Team engagements, for businesses of all shapes, sizes, and industries. In this webinar, our SBS CyberSecurity network security experts (our hacker team!) will take you beyond just the standard Vulnerability Assessment and Penetration Test to share with you the different ways and tests you should be considering to keep them and the real hackers out of your networks. Well talk about everything from VAs and PTs to Red Team Assessments, Web Application Assessments, Password Audits, API Security Testing, and more!

Online
Price
$249
Member Price
$199

Enroll
How To: Big 4 IS Risk Assessments

How To: Big 4 IS Risk Assessments

April 23, 2025 - 2:00 PM CST | 1.5 CPE

From an IT and Information Security perspective, financial institutions are required to perform four (4) major risk assessments. This webinar will cover each of these risk assessments, including not just HOW to perform these risk assessments, but WHY we WANT to perform them (the objective!). Additionally, you have to perform these risk assessments regardless, so lets talk about how to make them VALUABLE and not just a thing to check off the list.While this webinar is geared towards financial institutions, any regulated business or organization that truly values cybersecurity will gain insightful knowledge into how to truly quantify, measure, and manage risk using these methods.

Online
Price
$249
Member Price
$199

Enroll
Plan, Test, Conquer: How Testing Your BCP and IRP Can Save Your Business

Plan, Test, Conquer: How Testing Your BCP and IRP Can Save Your Business

May 21, 2025 - 2:00 PM CST | 1.5 CPE

In today's fast-paced and unpredictable business environment, the ability to quickly recover from disruptions is crucial. Join us for an insightful webinar where we delve into the critical importance of regularly testing your Business Resilience Plans, including your Business Continuity Plan (BCP), Disaster Recovery Plan, Pandemic Preparedness Plan, and Incident Response Plan (IRP). This session will provide you with a comprehensive understanding of why these tests are essential and how they can safeguard your organization against unforeseen events.

Online
Price
$249
Member Price
$199

Enroll
Vendor Risk Management – Best Practices 2025

Vendor Risk Management – Best Practices 2025

June 18, 2025 - 2:00 PM CST | 1.5 CPE

Nearly every business today is incredibly reliant on vendors to run our day-to-day operations, especially if were connected to the internet. But weve also experienced more and more outages and breaches at the hands of our vendors recently. So how do we handle this risk? Vendor Management of course!Regulated businesses have guidance to follow from banking regulations to NIST CSF to SOC Reports Vendor (or Supply Chain) Risk Management is a staple in the world of cybersecurity. But how do you do more than just check the box? By taking a risk management approach, of course!

Online
Price
$249
Member Price
$199

Enroll
Microsoft 365 Security Updates

Microsoft 365 Security Updates

July 16, 2025 - 2:00 PM CST | 1.5 CPE

Last year, we dove deep into the Microsoft 365 environment and shared M365 security best practices across numerous features and functions. However, the M365 world changesquickly, so well review any major security changes over the past year you needto know, as well as dive into a few new areas of M365 to secure.

Online
Price
$249
Member Price
$199

Enroll
Why Data Flow Diagrams Can Change Your Life

Why Data Flow Diagrams Can Change Your Life

August 13, 2025 - 2:00 PM CST | 1.5 CPE

Its 10:00 PM on a Friday night do you know where your data is? This is the question every organization should be asking themselves where does your data go once it leaves your network? Who touches that data? How does it get to where it ultimately needs to go? And is it SAFE?In this webinar, well talk about how a simple visual diagram called a Data Flow Diagram (or DFD) can help you truly get ahold of the true data economy of your organization and whether or not youre data is hanging out with the right crowd or falling in with the bad kids.

Online
Price
$249
Member Price
$199

Enroll
Incident Response Fundamentals 2025 Edition

Incident Response Fundamentals 2025 Edition

September 17, 2025 - 2:00 PM CST | 1.5 CPE

In todays technology-driven world, organizations face an unprecedented and constant wave of cyber attacks that are becoming more sophisticated and frequent. From ransomware to data breaches, no business is immune. Thats where Incident Response Planning comes into play. A strong IRP can help your organization anticipate cyber attacks and have a plan to deal with those incidents, should they occur. In this webinar, we will cover the fundamentals of building a strong, valuable Incident Response Plan that covers everything you absolutely need to have in your IRP, as well as ways to continue to mature your IRP planning and testing over time. SBS CyberSecuritys Incident Response experts will share the insights and experiences we have gained over the years in helping our clients build strong, valuable IR Plans as well as response and recover from cyber attacks and incidents.

Online
Price
$249
Member Price
$199

Enroll
Mission API-Possible: How to Secure and Test Your APIs

Mission API-Possible: How to Secure and Test Your APIs

October 22, 2025 - 2:00 PM CST | 1.5 CPE

As more organizations shift to cloud computing, the API (Application Programming Interfaces) economy is becoming more and more prevalent connecting organizations and applications. APIs can enable seamless integrations, allowing businesses of all shapes and sizes to offer enhanced, faster, and more efficient customer experiences.However . . . APIs come with risks. In this webinar, we'll explain the function of APIs, review regulatory guidance, and cover API security risks, including vulnerabilities like insecure authentication, data exposure, and the growing threat of API-targeted attacks. Well wrap up by talking through what you should be doing and considering if youre developing or using APIs today.

Online
Price
$249
Member Price
$199

Enroll
Modern Network Architectures – Today’s Best Practices

Modern Network Architectures – Today’s Best Practices

November 19, 2025 - 2:00 PM CST | 1.5 CPE

As an organization, is your technology working for you as well as it should? The whole point of using technology is to make us faster and more efficient, right? What happens when your technology causes more roadblocks or inefficiencies than the productivity you gain? In this webinar, well break down some of the key messages about todays technology infrastructure and IT architectures. Well also show you how to perform an IT Architecture review to help your organization find areas where your technology stack could be improved to gain efficiencies and better set you up for future success!

Online
Price
$249
Member Price
$199

Enroll
Cyber Lessons Learned from 2025 and Trends for 2026

Cyber Lessons Learned from 2025 and Trends for 2026

December 17, 2025 - 2:00 PM CST | 1.5 CP

With 2025 winding down and 2026 staring us in the face, lets take a look at the biggest cybersecurity lessons we learned from 2025 and anticipate what's on the horizon.Join our SBS CyberSecurity experts for an engaging and insightful webinar where we'll dive into the most significant breaches and incidents of the past year, explore the latest technology trends and arrivals, and forecast what to expect in the world of cybersecurity and technology in 2026.

Online
Price
$249
Member Price
$199

Enroll
Current State of Banking Regulatory Guidance

Current State of Banking Regulatory Guidance

Recorded on January 15, 2025 - 2:00 PM CST | 1.5 CPE

Without going too far back into history, we know that banks are required to have a formal Information Security Program based on a risk assessment that ensures we protect the CIA of confidential customer information. But that goes all the way back to 1999 and GLBA... what regulatory guidance has changed over the past couple of years that we need to focus on today, and what guidance should we revisit and keep in mind?

Online
Price
$249
Member Price
$199

Enroll
Cyber Landscape Retrospect and Projections

Cyber Landscape Retrospect and Projections

Recorded on December 18, 2024 - 2:00 PM CST | 1.5 CPE

With 2024 nearly in the rearview mirror and 2025 on the horizon, lets take a look at the biggest lessons learned from 2024 and what we are relatively likely to expect in 2025. Well discuss the biggest breaches in incidents from the past year, as well as the biggest technology trends and arrivals. Well also highlight what to expect more or less of relating to technology and threats in 2025.

Online
Price
$249
Member Price
$199

Enroll
Scam Alert: Top Financial Fraud Schemes

Scam Alert: Top Financial Fraud Schemes

Recorded on November 20, 2024 | 1.5 CPE

In this engaging webinar, we delve into the ever-evolving world of financial fraud, focusing on the top scams that individuals and businesses need to be aware of in 2024. We will explore the latest tactics used by fraudsters, leveraging both technology and psychological manipulation. From deceptive deepfakes to stolen identities to old-school check fraud, well dissect the threats and provide practical strategies to safeguard your financial well-being. Join us to stay informed, protect your assets, and outsmart the scammers!

Online
Price
$249
Member Price
$199

Enroll
Data Classification and Document Retention

Data Classification and Document Retention

Recorded on October 16, 2024 | 1.5 CPE

As most businesses have converted most of their records into electronic format by now, the big question becomes how long do I need to retain our electronic records? While the simple answer is for the same amount of time as you are required to maintain physical records, there are additional complexities to sort through. To top things off, there is very little guidance about how to handle data classification and retention.In this webinar, well explore the best practices and guidance around data classification and document retention, including how to properly store electronic records, for how long, and where to keep your records.

Online
Price
$249
Member Price
$199

Enroll
A Guide to Password Cracking

A Guide to Password Cracking

Recorded on September 18, 2024 | 1.5 CPE

Passwords continue to be the bane of users existence. Humans are bad at passwords we dont like creating them, we dont like remembering them, and we reuse the heck out of them. How many of you (or your users) have used some variation of Spring2024! for work accounts this year!? The answer: too many!Cyber criminals know this and take advantage of our poor password tendencies by stealing our passwords, brute-forcing our passwords, or both. And if youre re-using passwords for other websites, like online banking, email, or social media then youre putting a lot at risk.In this webinar, well explore the art of password compromise and cracking, including how to create strong passwords, how fast passwords can be cracked today, and how to prevent password reuse.

Online
Price
$249
Member Price
$199

Enroll
The End of FFIEC CAT

The End of FFIEC CAT

Recorded on September 10, 2024 | 1.5 CPE

As the FFIEC Cybersecurity Assessment Tool (CAT) approaches its sunset, financial institutions must navigate the transition to alternative cybersecurity frameworks. This comprehensive webinar will provide you with the essential updates and practical guidance needed to ensure a smooth transition and maintain robust cybersecurity practices. Laura Zannucci will delve into the broader implications for financial institutions, explore alternative cybersecurity frameworks, and address your questions and concerns.

Online
Price
$299
Member Price
$249

Enroll
Single Sign-On: A Tale of Two Sides

Single Sign-On: A Tale of Two Sides

Recorded on August 21, 2024 | 1.5 CPE

Like any double-edged sword, SSO has its own unique set of advantages and disadvantages. On the plus side, SSO enhances security by reducing the number of passwords to manage. It also streamlines user access, boosting productivity. On the flip side, SSO may introduce a single point of failure, meaning if one system goes down, so does access to all others. Additionally, SSO implementation can be complex and costly. Our experts discuss the pros and cons of SSO, the benefits to leveraging SSO properly, and how to implement SSO effectively.

Online
Price
$249
Member Price
$199

Enroll
Compliance and Security Within Microsoft 365 Tenants

Compliance and Security Within Microsoft 365 Tenants

Recorded on July 31, 2024 | 1.5 CPE

Frank Huscher covered Microsoft Entra and Intune in his Tactical Guide to Microsoft 365 earlier this month. Now it's Dylan Kreutzfeldt's turn to get into the nitty gritty of compliance, security, and governance of data within Microsoft 365 Tenants such as Purview, Exchange, SharePoint, OneDrive, Teams, and Defender.

Online
Price
$299
Member Price
$249

Enroll
Is it Time to Switch to the Cloud?

Is it Time to Switch to the Cloud?

Recorded on July 17, 2024 | 1.5 CPE

Frank Huscher will unwrap Microsoft Entra and Intune to help you secure your Microsoft 365 users, devices, and applications. A Senior IT Auditor, Frank will talk you through the administration how-to, security must-haves, and general best practices to setup a robust and comprehensive solution for all your endpoints.

Online
Price
$249
Member Price
$199

Enroll
Tactical Guide to Microsoft 365 - Entra and Intune

Tactical Guide to Microsoft 365 - Entra and Intune

Recorded on July 9, 2024 | 1.5 CPE

Frank Huscher will unwrap Microsoft Entra and Intune to help you secure your Microsoft 365 users, devices, and applications. A Senior IT Auditor, Frank will talk you through the administration how-to, security must-haves, and general best practices to setup a robust and comprehensive solution for all your endpoints.

Online
Price
$299
Member Price
$249

Enroll
Information Security Professional Panel Discussion

Information Security Professional Panel Discussion

Recorded on June 20, 2024 | 1.5 CPE

Were taking a break from our regular, topical webinars to bring you a different type of webinar! We invited several IT and Information Security Professionals to discuss what strategic projects they have on tap for 2024 in a highly interactive panel. Our panelists will share some of their top cybersecurity-related concerns, their lessons learned from 2023, and their strategic projects for next year and beyond. We'll also open up the panel for questions from and discussion with our attendees. Dont miss this exciting opportunity to hear what other folks like you are working on in their environments and ask them questions!

Online
Price
$249
Member Price
$199

Enroll
Journey into the Maze of Multifactor Authentication

Journey into the Maze of Multifactor Authentication

Recorded on May 15, 2024 | 1.5 CPE

Multi-Factor Authentication (MFA) is billed as one of the most impactful controls you can deploy to mitigate cyber risk, and rightfully so! But what exactly is this enigmatic MFA, and why is it the talk of the cybersecurity town? Prepare to embark on an exciting adventure, where we'll unravel the mysteries of MFA, exploring its importance, pros, cons, and the art of deploying it like a pro.

Online
Price
$249
Member Price
$199

Enroll
The Ultimate Guide to Microsoft 365 Security

The Ultimate Guide to Microsoft 365 Security

Recorded on April 17, 2024 | 1.5 CPE

Microsoft 365 is now used by over 1 million companies and boasts more than 345 million users globally. 78% of Microsoft 365 organizations are small businesses. Microsoft Office has long been a staple of the business world, but as we shift from hosting our data on-premises to the cloud, both the risks and rewards have changed.Your software is only as good as the security controls you implement to protect your organization. While Microsoft 365 introduces new and unique threats, new and innovative controls are also a strong benefit of this cloud-based productivity suite.

Online
Price
$249
Member Price
$199

Enroll
2024 Top Audit Recommendations

2024 Top Audit Recommendations

Recorded on March 20, 2024 | 1.5 CPE

Documenting anInformation Security Program (ISP) is an important step in protecting yourorganization from cyber threats, but its only as good as controls that youveactually implemented. Testing your controls to ensure youre doing what you sayyoure doing and what you're doing is adequate is the cornerstone to astrong ISP. The objective of a good IT Audit is to find areas of cybersecurityimprovement for your organization.a. SBS conducts over 500 audits per year across the US (primarily for financial institutions, but also includes businesses of all shapes, sizes, and industries). Christy Thomas shares the 10 most frequently recommended IT Audit findings from the past year, and how your organization can leverage these findings to get ahead of your next IT Audit.

Online
Price
$249
Member Price
$199

Enroll
Getting to the Core of NIST CSF 2.0

Getting to the Core of NIST CSF 2.0

Recorded on March 13, 2024 | 1.5 CPE

John Helland takes a deep dive into the updated NIST Cybersecurity Framework (CSF). The NIST CSF 2.0 is a comprehensive and customizable guide for reducing cybersecurity risk for all types of organizations, regardless of their size, sector, or level of sophistication.This is for you if you use NIST CSFT or are looking at adopting this framework. Learn from an SBS cybersecurity professional how to leverage the CSF 2.0 to enhance your organizations cybersecurity posture and resilience.

Online
Price
$295
Member Price
$245

Enroll
Navigating the Cyber Insurance Landscape

Navigating the Cyber Insurance Landscape

Recorded on February 15, 2024 | 1.5 CPE

Today's cyber insurance world is still a bit like the wild west - it's always changing, it can be expensive, and different providers offer different types and limits. No insurance provider handles cyber insurance the same! However, cyber insurance has become an important element of today's insurance landscape, and the best carriers can provide a very valuable insurance product.

Online
Price
$249
Member Price
$199

Enroll
Maintaining a Cyber-Savvy Culture

Maintaining a Cyber-Savvy Culture

Recorded on January 17, 2024 | 1.5 CPE

What price has your organization paid for having a mindset and belief that you arent on the radar of some cyber criminal? Does your business believe that hackers dont know who you are or where you are, or that youre not valuable enough to a hacker to matter? Thats exactly the cybersecurity culture a cyber criminal hopes you have, as opposed to the belief that cybersecurity is a critical element of keeping your business safe.Join Honey Shelton and dive into some real-world examples of the impact of cyber-incidents. Todays cyber threats demand proactive measures, what price have businesses paid for believing they are not on the radar of the cyber thug?

Online
Price
$249
Member Price
$199

Enroll
The Age of AI: The Risks and Rewards of AI for Business

The Age of AI: The Risks and Rewards of AI for Business

Recorded on December 20, 2023 | 1.5 CPE

In the ever-evolving business world, staying ahead of the curve is crucial, and Artificial Intelligence is the curve you need to conquer. But before you dive headfirst into the AI pool, let's take a deep dive into the rewards and risks of this game-changing technology.Join us for an insightful webinar where we'll explore the exciting possibilities of AI in business. We'll uncover how AI can transform your operations, from streamlining processes to optimizing decision-making. But don't worry, we won't sugarcoat it we'll also tackle the potential pitfalls and risks around AI, ensuring you're well-equipped to navigate those challenges as well.

Online
Price
$249
Member Price
$199

Enroll
FDIC InTREx Changes and their Impact on your next IT Exam

FDIC InTREx Changes and their Impact on your next IT Exam

Recorded on December 14, 2023 | 1.5 CPE

How will the recent changes and updates to the IT Risk Examination (InTREx) program impact your next IT Exam? Ensure you follow the new guidelines regarding third-party relationships, accountability, responsibility to meet these new reporting requirements.

Online
Price
$295
Member Price
$245

Enroll
Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Recorded on November 16, 2023 | 1.5 CPE

On average, an organization takes 287 days to detect and contain a data breach. Hackers today are very good at breaking into networks and staying undetected for long periods before executing their ultimate objectives. When a cyber incident inevitably occurs, your best bet is to assume your network is compromised and act accordingly rather than think youre not compromised and carry on as usual.One of the most important questions to ask yourself is: If a hacker was in my network, would I know? Testing your internal and external network security controls regularly is an important way to find the answer. But what happens if the Penetration Test has little or no success?Assumed-breach testing simulates the initial foothold an attacker might obtain, allowing for more in-depth testing and providing a unique perspective of the organizations readiness for a real-world breach. Assumed-breach testing helps answer the question of what can happen if we were breached?

Online
Price
$249
Member Price
$199

Enroll
Defending Your Business Against Business Email Compromise

Defending Your Business Against Business Email Compromise

Recorded on October 18, 2023 | 1.5 CPE

The two most common attack vectors that lead to Business Email Compromise (BEC) are Phishing Emails and Compromised Credentials. According to recent studies, an estimated 3.4 BILLION phishing emails are sent daily. Additionally, the average internet user has approximately 100 different passwords to remember, which often leads to credential reuse. Those are some heaving things working against the average user, especially regarding email account compromise. Unfortunately, we've seen many organizations have their business email accounts compromised through credential reuse. Business Email Compromise (BEC) can lead to propagating further BEC attacks and a full-blown data breach and network compromise. In this session, we'll walk through a real-world case study of a BEC attack, how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your organization.

Online
Price
$249
Member Price
$199

Enroll
Remote Work: Secure Your Devices and Data from Anywhere

Remote Work: Secure Your Devices and Data from Anywhere

Recorded on September 20, 2023 | 1.5 CPE

If the pandemic taught us anything, it is that the workforce of the future is embracing remote and mobile work like never before! During the pandemic, most organizations were forced to quickly figure out how to enable remote work. Speed and convenience often trumped security.As the remote work revolution continues, safeguarding our business data, employees, and customers from the ever-evolving cyber threats becomes paramount. A coffee shop, airport, beach, or their own homesall these locations are now part of your corporate network.Join us for this engaging webinar and discuss with cyber experts how to protect your organization's digital landscape and your remote workers.

Online
Price
$249
Member Price
$199

Enroll
Crafting Your Ultimate Incident Response Strategy

Crafting Your Ultimate Incident Response Strategy

Recorded on August 16, 2023 | 1.5 CPE

In today's cybersecurity landscape, it is no longer possible to assume that our organization will never be compromised. It is not a question of if a cyber incident will occur, but when. As an IT/IS professional or executive, you don't want to be staring down a major cyber incident without a strong Incident Response Plan that's been thoughtfully crafted, reviewed, and tested.Don't miss our power-packed webinar on building an effective Incident Response Plan. We'll equip you with essential tips and strategies for building a robust IRP so you can handle any type of cyber incident thrown your way.

Online
Price
$249
Member Price
$199

Enroll
New Interagency Guidance on Third-Party Relationships: Risk Management - What You MUST Know!

New Interagency Guidance on Third-Party Relationships: Risk Management - What You MUST Know!

Recorded on July 12, 2023 | 1.5 CPE

It has been a minute since financial institutions received new regulatory guidance on vendor management! The original guidance from the FDIC (FIL 44-2008) is old enough to drive. The most recent vendor management guidance from the OCC (Bulletin 2013-20) and FRB (SR 13-19) are in double digits. Good news! Those guidelines have been rescinded and are replaced with ONE joint interagency playbook on vendor management: The Interagency Guidance on Third-Party Relationships: Risk Management.

Online
Price
$295
Member Price
$199

Enroll