Skip to content
TRAC-Logo
 

Compliance. Simplified.

Simplify cybersecurity risk management and tackle your cybersecurity challenges with ease. TRAC automates the tedious risk assessment process and produces customized results that align with regulations, best practices, and your strategic goals.

HackerHour_Header
January 18, 2024< 1 min read

Hacker Hour: The 5 Most Critical Roles of an Information Security Officer

HH-web (3)

Hacker Hour: The 5 Most Critical Roles of an Information Security Officer

In today's digital landscape, Multi-Factor Authentication (MFA) is hailed as the security gold standard. However, is it possible that even this powerful defense can be compromised? It's time to dive into the tactics, techniques, and tools that cybercriminals use to outsmart MFA.

Join us for this webinar, where we'll discuss real-world scenarios and methods that cyber criminals deploy to bypass MFA, and cover practical tips and best practices to stay one step ahead.

 

Watch the Recording

 


 

 

Hacker Hour webinars are a series of free webinars hosted by SBS CyberSecurity. Unlike paid webinars, Hacker Hours are aimed to meet on a monthly basis to discuss cybersecurity issues and trends in an open format. Attendees are encouraged to join the conversation and get their questions answered. SBS will also offer products and services to help financial institutions with these specific issues.

ADDITIONAL WEBINARS