Institute

Results 11-20 of 23
Journey into the Maze of Multifactor Authentication

Journey into the Maze of Multifactor Authentication

Recorded on May 15, 2024 | 1.5 CPE

Multi-Factor Authentication (MFA) is billed as one of the most impactful controls you can deploy to mitigate cyber risk, and rightfully so! But what exactly is this enigmatic MFA, and why is it the talk of the cybersecurity town? Prepare to embark on an exciting adventure, where we'll unravel the mysteries of MFA, exploring its importance, pros, cons, and the art of deploying it like a pro.

Online
Price
$249
Member Price
$199

Enroll
The Ultimate Guide to Microsoft 365 Security

The Ultimate Guide to Microsoft 365 Security

Recorded on April 17, 2024 | 1.5 CPE

Microsoft 365 is now used by over 1 million companies and boasts more than 345 million users globally. 78% of Microsoft 365 organizations are small businesses. Microsoft Office has long been a staple of the business world, but as we shift from hosting our data on-premises to the cloud, both the risks and rewards have changed.Your software is only as good as the security controls you implement to protect your organization. While Microsoft 365 introduces new and unique threats, new and innovative controls are also a strong benefit of this cloud-based productivity suite.

Online
Price
$249
Member Price
$199

Enroll
2024 Top Audit Recommendations

2024 Top Audit Recommendations

Recorded on March 20, 2024 | 1.5 CPE

Documenting anInformation Security Program (ISP) is an important step in protecting yourorganization from cyber threats, but its only as good as controls that youveactually implemented. Testing your controls to ensure youre doing what you sayyoure doing and what you're doing is adequate is the cornerstone to astrong ISP. The objective of a good IT Audit is to find areas of cybersecurityimprovement for your organization.a. SBS conducts over 500 audits per year across the US (primarily for financial institutions, but also includes businesses of all shapes, sizes, and industries). Christy Thomas shares the 10 most frequently recommended IT Audit findings from the past year, and how your organization can leverage these findings to get ahead of your next IT Audit.

Online
Price
$249
Member Price
$199

Enroll
Getting to the Core of NIST CSF 2.0

Getting to the Core of NIST CSF 2.0

Recorded on March 13, 2024 | 1.5 CPE

John Helland takes a deep dive into the updated NIST Cybersecurity Framework (CSF). The NIST CSF 2.0 is a comprehensive and customizable guide for reducing cybersecurity risk for all types of organizations, regardless of their size, sector, or level of sophistication.This is for you if you use NIST CSFT or are looking at adopting this framework. Learn from an SBS cybersecurity professional how to leverage the CSF 2.0 to enhance your organizations cybersecurity posture and resilience.

Online
Price
$295
Member Price
$245

Enroll
Navigating the Cyber Insurance Landscape

Navigating the Cyber Insurance Landscape

Recorded on February 15, 2024 | 1.5 CPE

Today's cyber insurance world is still a bit like the wild west - it's always changing, it can be expensive, and different providers offer different types and limits. No insurance provider handles cyber insurance the same! However, cyber insurance has become an important element of today's insurance landscape, and the best carriers can provide a very valuable insurance product.

Online
Price
$249
Member Price
$199

Enroll
Maintaining a Cyber-Savvy Culture

Maintaining a Cyber-Savvy Culture

Recorded on January 17, 2024 | 1.5 CPE

What price has your organization paid for having a mindset and belief that you arent on the radar of some cyber criminal? Does your business believe that hackers dont know who you are or where you are, or that youre not valuable enough to a hacker to matter? Thats exactly the cybersecurity culture a cyber criminal hopes you have, as opposed to the belief that cybersecurity is a critical element of keeping your business safe.Join Honey Shelton and dive into some real-world examples of the impact of cyber-incidents. Todays cyber threats demand proactive measures, what price have businesses paid for believing they are not on the radar of the cyber thug?

Online
Price
$249
Member Price
$199

Enroll
The Age of AI: The Risks and Rewards of AI for Business

The Age of AI: The Risks and Rewards of AI for Business

Recorded on December 20, 2023 | 1.5 CPE

In the ever-evolving business world, staying ahead of the curve is crucial, and Artificial Intelligence is the curve you need to conquer. But before you dive headfirst into the AI pool, let's take a deep dive into the rewards and risks of this game-changing technology.Join us for an insightful webinar where we'll explore the exciting possibilities of AI in business. We'll uncover how AI can transform your operations, from streamlining processes to optimizing decision-making. But don't worry, we won't sugarcoat it we'll also tackle the potential pitfalls and risks around AI, ensuring you're well-equipped to navigate those challenges as well.

Online
Price
$249
Member Price
$199

Enroll
FDIC InTREx Changes and their Impact on your next IT Exam

FDIC InTREx Changes and their Impact on your next IT Exam

Recorded on December 14, 2023 | 1.5 CPE

How will the recent changes and updates to the IT Risk Examination (InTREx) program impact your next IT Exam? Ensure you follow the new guidelines regarding third-party relationships, accountability, responsibility to meet these new reporting requirements.

Online
Price
$295
Member Price
$245

Enroll
Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Recorded on November 16, 2023 | 1.5 CPE

On average, an organization takes 287 days to detect and contain a data breach. Hackers today are very good at breaking into networks and staying undetected for long periods before executing their ultimate objectives. When a cyber incident inevitably occurs, your best bet is to assume your network is compromised and act accordingly rather than think youre not compromised and carry on as usual.One of the most important questions to ask yourself is: If a hacker was in my network, would I know? Testing your internal and external network security controls regularly is an important way to find the answer. But what happens if the Penetration Test has little or no success?Assumed-breach testing simulates the initial foothold an attacker might obtain, allowing for more in-depth testing and providing a unique perspective of the organizations readiness for a real-world breach. Assumed-breach testing helps answer the question of what can happen if we were breached?

Online
Price
$249
Member Price
$199

Enroll
Defending Your Business Against Business Email Compromise

Defending Your Business Against Business Email Compromise

Recorded on October 18, 2023 | 1.5 CPE

The two most common attack vectors that lead to Business Email Compromise (BEC) are Phishing Emails and Compromised Credentials. According to recent studies, an estimated 3.4 BILLION phishing emails are sent daily. Additionally, the average internet user has approximately 100 different passwords to remember, which often leads to credential reuse. Those are some heaving things working against the average user, especially regarding email account compromise. Unfortunately, we've seen many organizations have their business email accounts compromised through credential reuse. Business Email Compromise (BEC) can lead to propagating further BEC attacks and a full-blown data breach and network compromise. In this session, we'll walk through a real-world case study of a BEC attack, how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your organization.

Online
Price
$249
Member Price
$199

Enroll