Institute

Results 11-17 of 17
The Age of AI: The Risks and Rewards of AI for Business

The Age of AI: The Risks and Rewards of AI for Business

Recorded on December 20, 2023 | 1.5 CPE

In the ever-evolving business world, staying ahead of the curve is crucial, and Artificial Intelligence is the curve you need to conquer. But before you dive headfirst into the AI pool, let's take a deep dive into the rewards and risks of this game-changing technology.Join us for an insightful webinar where we'll explore the exciting possibilities of AI in business. We'll uncover how AI can transform your operations, from streamlining processes to optimizing decision-making. But don't worry, we won't sugarcoat it we'll also tackle the potential pitfalls and risks around AI, ensuring you're well-equipped to navigate those challenges as well.

Online
Price
$249
Member Price
$199

Enroll
FDIC InTREx Changes and their Impact on your next IT Exam

FDIC InTREx Changes and their Impact on your next IT Exam

Recorded on December 14, 2023 | 1.5 CPE

How will the recent changes and updates to the IT Risk Examination (InTREx) program impact your next IT Exam? Ensure you follow the new guidelines regarding third-party relationships, accountability, responsibility to meet these new reporting requirements.

Online
Price
$295
Member Price
$245

Enroll
Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Recorded on November 16, 2023 | 1.5 CPE

On average, an organization takes 287 days to detect and contain a data breach. Hackers today are very good at breaking into networks and staying undetected for long periods before executing their ultimate objectives. When a cyber incident inevitably occurs, your best bet is to assume your network is compromised and act accordingly rather than think youre not compromised and carry on as usual.One of the most important questions to ask yourself is: If a hacker was in my network, would I know? Testing your internal and external network security controls regularly is an important way to find the answer. But what happens if the Penetration Test has little or no success?Assumed-breach testing simulates the initial foothold an attacker might obtain, allowing for more in-depth testing and providing a unique perspective of the organizations readiness for a real-world breach. Assumed-breach testing helps answer the question of what can happen if we were breached?

Online
Price
$249
Member Price
$199

Enroll
Defending Your Business Against Business Email Compromise

Defending Your Business Against Business Email Compromise

Recorded on October 18, 2023 | 1.5 CPE

The two most common attack vectors that lead to Business Email Compromise (BEC) are Phishing Emails and Compromised Credentials. According to recent studies, an estimated 3.4 BILLION phishing emails are sent daily. Additionally, the average internet user has approximately 100 different passwords to remember, which often leads to credential reuse. Those are some heaving things working against the average user, especially regarding email account compromise. Unfortunately, we've seen many organizations have their business email accounts compromised through credential reuse. Business Email Compromise (BEC) can lead to propagating further BEC attacks and a full-blown data breach and network compromise. In this session, we'll walk through a real-world case study of a BEC attack, how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your organization.

Online
Price
$249
Member Price
$199

Enroll
Remote Work: Secure Your Devices and Data from Anywhere

Remote Work: Secure Your Devices and Data from Anywhere

Recorded on September 20, 2023 | 1.5 CPE

If the pandemic taught us anything, it is that the workforce of the future is embracing remote and mobile work like never before! During the pandemic, most organizations were forced to quickly figure out how to enable remote work. Speed and convenience often trumped security.As the remote work revolution continues, safeguarding our business data, employees, and customers from the ever-evolving cyber threats becomes paramount. A coffee shop, airport, beach, or their own homesall these locations are now part of your corporate network.Join us for this engaging webinar and discuss with cyber experts how to protect your organization's digital landscape and your remote workers.

Online
Price
$249
Member Price
$199

Enroll
Crafting Your Ultimate Incident Response Strategy

Crafting Your Ultimate Incident Response Strategy

Recorded on August 16, 2023 | 1.5 CPE

In today's cybersecurity landscape, it is no longer possible to assume that our organization will never be compromised. It is not a question of if a cyber incident will occur, but when. As an IT/IS professional or executive, you don't want to be staring down a major cyber incident without a strong Incident Response Plan that's been thoughtfully crafted, reviewed, and tested.Don't miss our power-packed webinar on building an effective Incident Response Plan. We'll equip you with essential tips and strategies for building a robust IRP so you can handle any type of cyber incident thrown your way.

Online
Price
$249
Member Price
$199

Enroll
New Interagency Guidance on Third-Party Relationships: Risk Management - What You MUST Know!

New Interagency Guidance on Third-Party Relationships: Risk Management - What You MUST Know!

Recorded on July 12, 2023 | 1.5 CPE

It has been a minute since financial institutions received new regulatory guidance on vendor management! The original guidance from the FDIC (FIL 44-2008) is old enough to drive. The most recent vendor management guidance from the OCC (Bulletin 2013-20) and FRB (SR 13-19) are in double digits. Good news! Those guidelines have been rescinded and are replaced with ONE joint interagency playbook on vendor management: The Interagency Guidance on Third-Party Relationships: Risk Management.

Online
Price
$295
Member Price
$199

Enroll