Webinar

Results 61-70 of 94
Q1 2024 Cyber Report

Q1 2024 Cyber Report

March 8, 2024 - 11:00 AM CST

We'll cover a variety of topics during this presentation, including recent hot cybersecurity topics, new attack vectors, risk management best practices, regulatory guidance updates, and more.

Hacker Hour: What's Hot in Social Engineering

Hacker Hour: What's Hot in Social Engineering

Recorded on November 29, 2023 | 1 CPE

Social engineering is the art of manipulating people into performing actions or divulging confidential information. It is one of the most common and effective methods of cyberattacks, as it exploits human psychology rather than technical vulnerabilities.In this webinar, you will learn about the latest trends and techniques in social engineering, such as phishing, vishing, and smishing. You will also learn how to protect your organization and customers from these emerging threats.

Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Assumed Breach Testing: Why should you test as if a hacker is already in your network?

Recorded on November 16, 2023 | 1.5 CPE

On average, an organization takes 287 days to detect and contain a data breach. Hackers today are very good at breaking into networks and staying undetected for long periods before executing their ultimate objectives. When a cyber incident inevitably occurs, your best bet is to assume your network is compromised and act accordingly rather than think youre not compromised and carry on as usual.One of the most important questions to ask yourself is: If a hacker was in my network, would I know? Testing your internal and external network security controls regularly is an important way to find the answer. But what happens if the Penetration Test has little or no success?Assumed-breach testing simulates the initial foothold an attacker might obtain, allowing for more in-depth testing and providing a unique perspective of the organizations readiness for a real-world breach. Assumed-breach testing helps answer the question of what can happen if we were breached?

Online
Price
$249
Member Price
$199

Enroll
Hacker Hour: Four Critical Risk Assessments Organizations Should Get Good At

Hacker Hour: Four Critical Risk Assessments Organizations Should Get Good At

Recorded on October 25, 2023 | 1 CPE

With the world becoming more and more connected, it's becoming increasingly important to prioritize the safety of your sensitive data and information. To truly protect your organization, it's essential to take a proactive approach to assessing and managing risks. Join our upcoming webinar to learn about four key risk assessments that can take your information security to the next level.

Hacker Hour: How Bad Guys Bypass MFA

Hacker Hour: How Bad Guys Bypass MFA

Recorded on September 27, 2023 | 1 CPE

In today's digital landscape, Multi-Factor Authentication (MFA) is hailed as the security gold standard. However, is it possible that even this powerful defense can be compromised? It's time to dive into the tactics, techniques, and tools that cybercriminals use to outsmart MFA.

Defending Your Business Against Business Email Compromise

Defending Your Business Against Business Email Compromise

Recorded on October 18, 2023 | 1.5 CPE

The two most common attack vectors that lead to Business Email Compromise (BEC) are Phishing Emails and Compromised Credentials. According to recent studies, an estimated 3.4 BILLION phishing emails are sent daily. Additionally, the average internet user has approximately 100 different passwords to remember, which often leads to credential reuse. Those are some heaving things working against the average user, especially regarding email account compromise. Unfortunately, we've seen many organizations have their business email accounts compromised through credential reuse. Business Email Compromise (BEC) can lead to propagating further BEC attacks and a full-blown data breach and network compromise. In this session, we'll walk through a real-world case study of a BEC attack, how BEC can turn into full network compromise, and lessons you can leverage to prevent this attack from occurring in your organization.

Online
Price
$249
Member Price
$199

Enroll
Remote Work: Secure Your Devices and Data from Anywhere

Remote Work: Secure Your Devices and Data from Anywhere

Recorded on September 20, 2023 | 1.5 CPE

If the pandemic taught us anything, it is that the workforce of the future is embracing remote and mobile work like never before! During the pandemic, most organizations were forced to quickly figure out how to enable remote work. Speed and convenience often trumped security.As the remote work revolution continues, safeguarding our business data, employees, and customers from the ever-evolving cyber threats becomes paramount. A coffee shop, airport, beach, or their own homesall these locations are now part of your corporate network.Join us for this engaging webinar and discuss with cyber experts how to protect your organization's digital landscape and your remote workers.

Online
Price
$249
Member Price
$199

Enroll
Hacker Hour: AI Unveiled-Tackling the Early Risks of AI Technology

Hacker Hour: AI Unveiled-Tackling the Early Risks of AI Technology

Recorded on August 29, 2023 | 1 CPE

Are you ready to dive into the exciting world of artificial intelligence (AI) or is fear of the unknown holding you back? Join us for a thought-provoking webinar where we'll explore the early risks associated with AI technology adoption. With AI transforming industries and societies at lightning speed, it's crucial to understand and address potential downfalls. Get ready to learn about the current state of AI, potential risks, and strategies to mitigate these risks in your business.

Crafting Your Ultimate Incident Response Strategy

Crafting Your Ultimate Incident Response Strategy

Recorded on August 16, 2023 | 1.5 CPE

In today's cybersecurity landscape, it is no longer possible to assume that our organization will never be compromised. It is not a question of if a cyber incident will occur, but when. As an IT/IS professional or executive, you don't want to be staring down a major cyber incident without a strong Incident Response Plan that's been thoughtfully crafted, reviewed, and tested.Don't miss our power-packed webinar on building an effective Incident Response Plan. We'll equip you with essential tips and strategies for building a robust IRP so you can handle any type of cyber incident thrown your way.

Online
Price
$249
Member Price
$199

Enroll
Hacker Hour: 5 Business Challenges That Executives Overlook as the Business Grows

Hacker Hour: 5 Business Challenges That Executives Overlook as the Business Grows

Recorded on July 26, 2023 | 1 CPE

Every business executive knows that growth is essential for survival, but with it come many challenges. Among these, cybersecurity risk management stands out as a paramount concern that can make or break your growth journey. Join our host, Nick, and his guest Shane Daniel, Information Security Consulting - Team Lead at SBS, to gain strategies and actionable steps that your business can implement right away to forge a secure path towards growth, safeguarding your company every step of the way!