Skip to content
TRAC-Logo
 

Frustration-Free Risk Management

Simplify cybersecurity risk management and tackle your cybersecurity challenges with ease. TRAC automates the tedious risk assessment process and produces customized results that align with regulations, best practices, and your strategic goals.

Blog_HeaderGradients-10

Nick Podhradsky

avatar
Nick Podhradsky is the Head of Business Development at SBS CyberSecurity and host of the Hacker Hour. Nick has spent more than a decade working with bank leaders to identify and understand cybersecurity risk to make decisions that ultimately lower the impact and probability of a security breach.

Blog Post by Nick Podhradsky

Hacker Hour: What Does a Chief Information Security Officer Do? 5 Key Roles

Explore the roles of a Chief Information Security Officer in today's cybersecurity landscape. Watch our webinar & learn how they protect your information.
Start Reading

Hacker Hour: Cybersecurity Tabletop Exercise & Scenarios

Explore the value of the cybersecurity tabletop exercise in our webinar. Learn how these scenarios can enhance your organization's preparedness with SBS.
Start Reading

Hacker Hour: Social Engineering Trends & Techniques

Discover the latest trends & common techniques in social engineering. Learn how to protect against social engineering attacks with insights from SBS.
Start Reading

Hacker Hour: 4 Critical Cybersecurity Risk Assessments for Organizations

Discover the four critical cybersecurity risk assessments every organization should excel in. Learn key strategies & best practices in our webinar session.
Start Reading

How to Protect Yourself From Phishing Emails by Following the Golden Rule of Email

Learn the golden rule of email and safeguard yourself against phishing with our effective strategies and expert advice. Learn more with SBS CyberSecurity!
Start Reading

Hacker Hour: How Bad Guys Bypass MFA

Discover the techniques used by cybercriminals to bypass MFA. Join SBS Cyber's Hacker Hour to learn about MFA vulnerabilities and how to protect against them.
Start Reading

Hacker Hour: Strategies for Responding to Common Cybersecurity Incidents

Learn how to respond to common cyber incidents in our Hacker Hour webinar. Discover strategies & practical tips to enhance your cybersecurity response.
Start Reading

Hacker Hour: Microsoft 365 Security Defaults & Best Practices

Boost your Microsoft 365 security with expert tips on security defaults & best practices. Discover how to protect your data & optimize security on our webinar.
Start Reading