Skip to content
TRAC-Logo
 

Frustration-Free Risk Management

Simplify cybersecurity risk management and tackle your cybersecurity challenges with ease. TRAC automates the tedious risk assessment process and produces customized results that align with regulations, best practices, and your strategic goals.

HackerHour_Header
Nick PodhradskyFebruary 27, 2025< 1 min read

Hacker Hour: NIST CSF Risk Assessment: An Alternative for the FFIEC CAT

HackerHourBlog-VerticalBanner (4)

 Recorded on March 26       Duration: 1 hour       Free

With the FFIEC CAT being phased out, banks are actively seeking a reliable alternative. In this session, we’ll guide you through conducting a risk assessment using the NIST Cybersecurity Framework. Discover how this robust framework can possibly replace the CAT, providing your bank with a comprehensive and effective solution. Don’t miss this opportunity to enhance your cybersecurity strategy and ensure your institution’s resilience in the face of evolving threats.

 

Blog_Lock&Line-Gray

Meet Our

Speakers

Nick Podhradsky
Host: Nick Podhradsky DIRECTOR OF BUSINESS DEVELOPMENT - SBS CYBERSECURITY
ColePontosquare2
Guest: Cole Ponto Senior Information Security Consultant - SBS CYBERSECURITY

Blog_Lock&Line-Gray

What is the Hacker Hour Webinar Series?

The Hacker Hour webinar series provides an interactive and engaging cybersecurity training experience - completely free of charge. We encourage attendees to actively participate in the conversation, ask questions, share ideas, and suggest topics. Additionally, we offer a range of products and services to help alleviate any stress or concerns related to specific cybersecurity issues your organization may be facing.

Blog_Lock&Line-Gray

OTHER WEBINARS

February 23, 2023

Hacker Hour: Internal Network Penetration Testing

Learn about internal network penetration testing and how it fortifies your cybersecurity defenses. Discover the methods and ...
Start Reading
June 28, 2023

Hacker Hour: SOC 2 Report Strategies & Best Practices Explained

Learn the strategies and best practices to understand and leverage SOC 2 reports for your business's security compliance at ...
Start Reading
March 29, 2023

Hacker Hour: Critical Components of Vendor Management

Explore the three critical components of vendor management, including monitoring, reviews, & risk assessments. Learn how to ...
Start Reading