Institute

Results 1-23 of 23
Data Demystified: A Guide to Effective Classification and Retention

Data Demystified: A Guide to Effective Classification and Retention

October 16, 2024 - 2:00 PM CST | 1.5 CPE

As most businesses have converted most of their records into electronic format by now, the big question becomes how long do I need to retain our electronic records? While the simple answer is for the same amount of time as you are required to maintain physical records, there are additional complexities to sort through. To top things off, there is very little guidance about how to handle data classification and retention.In this webinar, well explore the best practices and guidance around data classification and document retention, including how to properly store electronic records, for how long, and where to keep your records.

Online
Price
$249
Member Price
$199

Enroll
Scam Alert: Top Financial Fraud Schemes

Scam Alert: Top Financial Fraud Schemes

November 20, 2024 - 2:00 PM CST | 1.5 CPE

In this engaging webinar, we delve into the ever-evolving world of financial fraud, focusing on the top scams that individuals and businesses need to be aware of in 2024. We will explore the latest tactics used by fraudsters, leveraging both technology and psychological manipulation. From deceptive deepfakes to stolen identities to old-school check fraud, well dissect the threats and provide practical strategies to safeguard your financial well-being. Join us to stay informed, protect your assets, and outsmart the scammers!

Online
Price
$249
Member Price
$199

Enroll
Cyber Landscape Retrospect and Projections

Cyber Landscape Retrospect and Projections

December 18, 2024 - 2:00 PM CST | 1.5 CPE

With 2024 nearly in the rearview mirror and 2025 on the horizon, lets take a look at the biggest lessons learned from 2024 and what we are relatively likely to expect in 2025. Well discuss the biggest breaches in incidents from the past year, as well as the biggest technology trends and arrivals. Well also highlight what to expect more or less of relating to technology and threats in 2025.

Online
Price
$249
Member Price
$199

Enroll
A Guide to Password Cracking

A Guide to Password Cracking

Recorded on September 18, 2024 | 1.5 CPE

Passwords continue to be the bane of users existence. Humans are bad at passwords we dont like creating them, we dont like remembering them, and we reuse the heck out of them. How many of you (or your users) have used some variation of Spring2024! for work accounts this year!? The answer: too many!Cyber criminals know this and take advantage of our poor password tendencies by stealing our passwords, brute-forcing our passwords, or both. And if youre re-using passwords for other websites, like online banking, email, or social media then youre putting a lot at risk.In this webinar, well explore the art of password compromise and cracking, including how to create strong passwords, how fast passwords can be cracked today, and how to prevent password reuse.

Online
Price
$249
Member Price
$199

Enroll
The End of FFIEC CAT

The End of FFIEC CAT

Recorded on September 10, 2024 | 1.5 CPE

As the FFIEC Cybersecurity Assessment Tool (CAT) approaches its sunset, financial institutions must navigate the transition to alternative cybersecurity frameworks. This comprehensive webinar will provide you with the essential updates and practical guidance needed to ensure a smooth transition and maintain robust cybersecurity practices. Laura Zannucci will delve into the broader implications for financial institutions, explore alternative cybersecurity frameworks, and address your questions and concerns.

Online
Price
$299
Member Price
$249

Enroll
Single Sign-On: A Tale of Two Sides

Single Sign-On: A Tale of Two Sides

Recorded on August 21, 2024 | 1.5 CPE

Like any double-edged sword, SSO has its own unique set of advantages and disadvantages. On the plus side, SSO enhances security by reducing the number of passwords to manage. It also streamlines user access, boosting productivity. On the flip side, SSO may introduce a single point of failure, meaning if one system goes down, so does access to all others. Additionally, SSO implementation can be complex and costly. Our experts discuss the pros and cons of SSO, the benefits to leveraging SSO properly, and how to implement SSO effectively.

Online
Price
$249
Member Price
$199

Enroll
Compliance and Security Within Microsoft 365 Tenants

Compliance and Security Within Microsoft 365 Tenants

Recorded on July 31, 2024 | 1.5 CPE

Frank Huscher covered Microsoft Entra and Intune in his Tactical Guide to Microsoft 365 earlier this month. Now it's Dylan Kreutzfeldt's turn to get into the nitty gritty of compliance, security, and governance of data within Microsoft 365 Tenants such as Purview, Exchange, SharePoint, OneDrive, Teams, and Defender.

Online
Price
$299
Member Price
$249

Enroll
Is it Time to Switch to the Cloud?

Is it Time to Switch to the Cloud?

Recorded on July 17, 2024 | 1.5 CPE

Frank Huscher will unwrap Microsoft Entra and Intune to help you secure your Microsoft 365 users, devices, and applications. A Senior IT Auditor, Frank will talk you through the administration how-to, security must-haves, and general best practices to setup a robust and comprehensive solution for all your endpoints.

Online
Price
$249
Member Price
$199

Enroll
Tactical Guide to Microsoft 365 - Entra and Intune

Tactical Guide to Microsoft 365 - Entra and Intune

Recorded on July 9, 2024 | 1.5 CPE

Frank Huscher will unwrap Microsoft Entra and Intune to help you secure your Microsoft 365 users, devices, and applications. A Senior IT Auditor, Frank will talk you through the administration how-to, security must-haves, and general best practices to setup a robust and comprehensive solution for all your endpoints.

Online
Price
$299
Member Price
$249

Enroll
Information Security Professional Panel Discussion

Information Security Professional Panel Discussion

Recorded on June 20, 2024 | 1.5 CPE

Were taking a break from our regular, topical webinars to bring you a different type of webinar! We invited several IT and Information Security Professionals to discuss what strategic projects they have on tap for 2024 in a highly interactive panel. Our panelists will share some of their top cybersecurity-related concerns, their lessons learned from 2023, and their strategic projects for next year and beyond. We'll also open up the panel for questions from and discussion with our attendees. Dont miss this exciting opportunity to hear what other folks like you are working on in their environments and ask them questions!

Online
Price
$249
Member Price
$199

Enroll
Journey into the Maze of Multifactor Authentication

Journey into the Maze of Multifactor Authentication

Recorded on May 15, 2024 | 1.5 CPE

Multi-Factor Authentication (MFA) is billed as one of the most impactful controls you can deploy to mitigate cyber risk, and rightfully so! But what exactly is this enigmatic MFA, and why is it the talk of the cybersecurity town? Prepare to embark on an exciting adventure, where we'll unravel the mysteries of MFA, exploring its importance, pros, cons, and the art of deploying it like a pro.

Online
Price
$249
Member Price
$199

Enroll
The Ultimate Guide to Microsoft 365 Security

The Ultimate Guide to Microsoft 365 Security

Recorded on April 17, 2024 | 1.5 CPE

Microsoft 365 is now used by over 1 million companies and boasts more than 345 million users globally. 78% of Microsoft 365 organizations are small businesses. Microsoft Office has long been a staple of the business world, but as we shift from hosting our data on-premises to the cloud, both the risks and rewards have changed.Your software is only as good as the security controls you implement to protect your organization. While Microsoft 365 introduces new and unique threats, new and innovative controls are also a strong benefit of this cloud-based productivity suite.

Online
Price
$249
Member Price
$199

Enroll
2024 Top Audit Recommendations

2024 Top Audit Recommendations

Recorded on March 20, 2024 | 1.5 CPE

Documenting anInformation Security Program (ISP) is an important step in protecting yourorganization from cyber threats, but its only as good as controls that youveactually implemented. Testing your controls to ensure youre doing what you sayyoure doing and what you're doing is adequate is the cornerstone to astrong ISP. The objective of a good IT Audit is to find areas of cybersecurityimprovement for your organization.a. SBS conducts over 500 audits per year across the US (primarily for financial institutions, but also includes businesses of all shapes, sizes, and industries). Christy Thomas shares the 10 most frequently recommended IT Audit findings from the past year, and how your organization can leverage these findings to get ahead of your next IT Audit.

Online
Price
$249
Member Price
$199

Enroll
Getting to the Core of NIST CSF 2.0

Getting to the Core of NIST CSF 2.0

Recorded on March 13, 2024 | 1.5 CPE

John Helland takes a deep dive into the updated NIST Cybersecurity Framework (CSF). The NIST CSF 2.0 is a comprehensive and customizable guide for reducing cybersecurity risk for all types of organizations, regardless of their size, sector, or level of sophistication.This is for you if you use NIST CSFT or are looking at adopting this framework. Learn from an SBS cybersecurity professional how to leverage the CSF 2.0 to enhance your organizations cybersecurity posture and resilience.

Online
Price
$295
Member Price
$245

Enroll
Navigating the Cyber Insurance Landscape

Navigating the Cyber Insurance Landscape

Recorded on February 15, 2024 | 1.5 CPE

Today's cyber insurance world is still a bit like the wild west - it's always changing, it can be expensive, and different providers offer different types and limits. No insurance provider handles cyber insurance the same! However, cyber insurance has become an important element of today's insurance landscape, and the best carriers can provide a very valuable insurance product.

Online
Price
$249
Member Price
$199

Enroll
Maintaining a Cyber-Savvy Culture

Maintaining a Cyber-Savvy Culture

Recorded on January 17, 2024 | 1.5 CPE

What price has your organization paid for having a mindset and belief that you arent on the radar of some cyber criminal? Does your business believe that hackers dont know who you are or where you are, or that youre not valuable enough to a hacker to matter? Thats exactly the cybersecurity culture a cyber criminal hopes you have, as opposed to the belief that cybersecurity is a critical element of keeping your business safe.Join Honey Shelton and dive into some real-world examples of the impact of cyber-incidents. Todays cyber threats demand proactive measures, what price have businesses paid for believing they are not on the radar of the cyber thug?

Online
Price
$249
Member Price
$199

Enroll
The Age of AI: The Risks and Rewards of AI for Business

The Age of AI: The Risks and Rewards of AI for Business

Recorded on December 20, 2023 | 1.5 CPE

In the ever-evolving business world, staying ahead of the curve is crucial, and Artificial Intelligence is the curve you need to conquer. But before you dive headfirst into the AI pool, let's take a deep dive into the rewards and risks of this game-changing technology.Join us for an insightful webinar where we'll explore the exciting possibilities of AI in business. We'll uncover how AI can transform your operations, from streamlining processes to optimizing decision-making. But don't worry, we won't sugarcoat it we'll also tackle the potential pitfalls and risks around AI, ensuring you're well-equipped to navigate those challenges as well.

Online
Price
$249
Member Price
$199

Enroll
FDIC InTREx Changes and their Impact on your next IT Exam

FDIC InTREx Changes and their Impact on your next IT Exam

Recorded on December 14, 2023 | 1.5 CPE

How will the recent changes and updates to the IT Risk Examination (InTREx) program impact your next IT Exam? Ensure you follow the new guidelines regarding third-party relationships, accountability, responsibility to meet these new reporting requirements.

Online
Price
$295
Member Price
$245

Enroll
Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Recorded on November 16, 2023 | 1.5 CPE

On average, an organization takes 287 days to detect and contain a data breach. Hackers today are very good at breaking into networks and staying undetected for long periods before executing their ultimate objectives. When a cyber incident inevitably occurs, your best bet is to assume your network is compromised and act accordingly rather than think youre not compromised and carry on as usual.One of the most important questions to ask yourself is: If a hacker was in my network, would I know? Testing your internal and external network security controls regularly is an important way to find the answer. But what happens if the Penetration Test has little or no success?Assumed-breach testing simulates the initial foothold an attacker might obtain, allowing for more in-depth testing and providing a unique perspective of the organizations readiness for a real-world breach. Assumed-breach testing helps answer the question of what can happen if we were breached?

Online
Price
$249
Member Price
$199

Enroll
Defending Your Business Against Business Email Compromise

Defending Your Business Against Business Email Compromise

Recorded on October 18, 2023 | 1.5 CPE

The two most common attack vectors that lead to Business Email Compromise (BEC) are Phishing Emails and Compromised Credentials. According to recent studies, an estimated 3.4 BILLION phishing emails are sent daily. Additionally, the average internet user has approximately 100 different passwords to remember, which often leads to credential reuse. Those are some heaving things working against the average user, especially regarding email account compromise. Unfortunately, we've seen many organizations have their business email accounts compromised through credential reuse. Business Email Compromise (BEC) can lead to propagating further BEC attacks and a full-blown data breach and network compromise. In this session, we'll walk through a real-world case study of a BEC attack, how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your organization.

Online
Price
$249
Member Price
$199

Enroll
Remote Work: Secure Your Devices and Data from Anywhere

Remote Work: Secure Your Devices and Data from Anywhere

Recorded on September 20, 2023 | 1.5 CPE

If the pandemic taught us anything, it is that the workforce of the future is embracing remote and mobile work like never before! During the pandemic, most organizations were forced to quickly figure out how to enable remote work. Speed and convenience often trumped security.As the remote work revolution continues, safeguarding our business data, employees, and customers from the ever-evolving cyber threats becomes paramount. A coffee shop, airport, beach, or their own homesall these locations are now part of your corporate network.Join us for this engaging webinar and discuss with cyber experts how to protect your organization's digital landscape and your remote workers.

Online
Price
$249
Member Price
$199

Enroll
Crafting Your Ultimate Incident Response Strategy

Crafting Your Ultimate Incident Response Strategy

Recorded on August 16, 2023 | 1.5 CPE

In today's cybersecurity landscape, it is no longer possible to assume that our organization will never be compromised. It is not a question of if a cyber incident will occur, but when. As an IT/IS professional or executive, you don't want to be staring down a major cyber incident without a strong Incident Response Plan that's been thoughtfully crafted, reviewed, and tested.Don't miss our power-packed webinar on building an effective Incident Response Plan. We'll equip you with essential tips and strategies for building a robust IRP so you can handle any type of cyber incident thrown your way.

Online
Price
$249
Member Price
$199

Enroll
New Interagency Guidance on Third-Party Relationships: Risk Management - What You MUST Know!

New Interagency Guidance on Third-Party Relationships: Risk Management - What You MUST Know!

Recorded on July 12, 2023 | 1.5 CPE

It has been a minute since financial institutions received new regulatory guidance on vendor management! The original guidance from the FDIC (FIL 44-2008) is old enough to drive. The most recent vendor management guidance from the OCC (Bulletin 2013-20) and FRB (SR 13-19) are in double digits. Good news! Those guidelines have been rescinded and are replaced with ONE joint interagency playbook on vendor management: The Interagency Guidance on Third-Party Relationships: Risk Management.

Online
Price
$295
Member Price
$199

Enroll