Hacker Hour: The CEO's Glossary for Cybersecurity
This webinar unpacks the most common cybersecurity acronyms, explains what they actually mean, and why they should matter to you as an executive.
Hacker Hour: Understanding Deepfake Technology
Our experts will provide insights into how deepfakes are created, the impact they can have on society, and how to protect yourself from falling victim.
Hacker Hour: CRI Profile: An Alternative to the FFIEC CAT
Learn how the CRI Profile can fill the gap left by the CAT, offering a comprehensive, strategic approach to resilience.
Hacker Hour: Encrypting Data In Transit
This webinar will discuss the challenges of implementing a program to encrypt data in transit.
Hacker Hour: The Fraudacity of Cybercriminals
Join us as we expose the scams and schemes of cybercriminals and provide practical strategies to protect your finances — and your customers — from fraud.
Hacker Hour: NIST CSF Risk Assessment: An Alternative for the FFIEC CAT
In this session, we’ll guide you through conducting a risk assessment using the NIST Cybersecurity Framework.
Hacker Hour: Cyber Insurance - Expense or Asset?
Learn how to turn cyber insurance into a strategic asset. We'll explore ways to lower risks, boost compliance, and cut insurance costs by choosing the right policies and aligning with industry standards.
Hacker Hour: Red Team Tactics - Penetration Testing From the Attacker’s Perspective
Join us for an eye-opening discussion about advanced penetration testing techniques, social engineering exploits, and methods for identifying and exploiting network and application vulnerabilities.
Hacker Hour: Building an Incident Response Playbook
Join us for this engaging webinar where we will guide you through the step-by-step process of creating an incident response playbook tailored to your unique needs. Additionally, we’ll common scenarios to include.
Hacker Hour: Suspicious Activity Reports - Reporting Cyber Events
Join us for a step-by-step guide on how to fill out SARs, addressing common issues such as identifying suspicious activities, ensuring accuracy, and meeting regulatory deadlines.