Blog Post by Nick Podhradsky
Hacker Hour: Unveiling the Most Common Findings in Penetration Testing
Join us to uncover the most common findings in penetration testing and offer proactive solutions to fortify your network before your next penetration test.
Start Reading
Hacker Hour: Harnessing the Value of Data Flow Diagrams
Join us as we outline the essential inputs and outputs of a good data flow diagram and discuss common challenges faced when creating and interpreting them.
Start Reading
Hacker Hour: Understanding Data Brokers and Protecting Privacy
Join us as we explore strategies to reduce cybersecurity risks by minimizing your digital footprint. Learn how to protect your privacy and strengthen your defenses in the digital world.
Start Reading
Hacker Hour: Quantum Computing 101
Join Dr. Travis Scholten of IBM Quantum for an overview of quantum computing, its potential applications, and how organizations can assess its benefits and risks.
Start Reading
Hacker Hour: Strengthening Cybersecurity in Business Banking Customers
Join us as we look back on the Interagency Guidance, discuss the short-term impact, and what you can do to ensure your vendor management program is compliant and effective.
Start Reading
Hacker Hour: Advancing Your Penetration Testing Program
Join this webinar as we discuss various industry recommendations and the process of starting a penetration testing program.
Start Reading
Hacker Hour: Documents to Review a Critical Vendor
Join this webinar as we walk you through the key documents needed when working with a critical vendor.
Start Reading
Hacker Hour: What Does a Chief Information Security Officer Do? 5 Key Roles
Explore the roles of a Chief Information Security Officer in today's cybersecurity landscape. Watch our webinar & learn how they protect your information.
Start Reading
Hacker Hour: Cybersecurity Tabletop Exercise & Scenarios
Explore the value of the cybersecurity tabletop exercise in our webinar. Learn how these scenarios can enhance your organization's preparedness with SBS.
Start Reading
Hacker Hour: Social Engineering Trends & Techniques
Discover the latest trends & common techniques in social engineering. Learn how to protect against social engineering attacks with insights from SBS.
Start Reading