Skip to content
TRAC-Logo
 

Frustration-Free Risk Management

Simplify cybersecurity risk management and tackle your cybersecurity challenges with ease. TRAC automates the tedious risk assessment process and produces customized results that align with regulations, best practices, and your strategic goals.

Blog_HeaderGradients-10

Blog

SBS Institute Webinar: The End of FFIEC CAT - Essential Updates and Next Steps

Get the essential updates and practical guidance needed to ensure a smooth transition away from the FFIEC CAT to alternative cybersecurity frameworks.
Start Reading

SBS Institute Webinar: Data Demystified - A Guide to Effective Classification and Retention

In this webinar, we’ll explore the best practices and guidance around data classification and document retention, including how to properly store electronic records, for how long, and where to keep your records.
Start Reading

SBS Institute Webinar: A Hacker's Guide to Password Cracking

In this webinar, we'll explore the art of password compromise and cracking, including how to create strong passwords, how fast passwords can be cracked today, and how to prevent password reuse.
Start Reading

SBS Institute Webinar: Single Sign On

Our experts discuss the pros and cons of SSO, the benefits to leveraging SSO properly, and how to implement SSO effectively.
Start Reading

SBS Institute Webinar: Compliance and Security Within Microsoft 365 Tenants

Join us to get into the nitty gritty of compliance, security, and governance of data within Microsoft 365 Tenants such as Purview, Exchange, SharePoint, OneDrive, Teams, and Defender.
Start Reading

SBS Institute Webinar: Is it Time to Switch to the Cloud?

In this webinar, we will explore the pros, cons, risks, and rewards of cloud-hosted environments and what you need to know if you're looking to shift to the cloud.
Start Reading

Hacker Hour: Advancing Your Penetration Testing Program

Join this webinar as we discuss various industry recommendations and the process of starting a penetration testing program.
Start Reading

Hot Topic: The NIST CSF 2.0 Next-Gen Cybersecurity Framework

This webinar is for you if you use NIST CSF or are looking at adopting this framework. Learn from an SBS cybersecurity professional how to leverage the CSF 2.0 to enhance your organization’s cybersecurity posture and resilience. Register today and get ready to take your cybersecurity to the next level.
Start Reading

Hacker Hour: Documents to Review a Critical Vendor

Join this webinar as we walk you through the key documents needed when working with a critical vendor.
Start Reading

Hacker Hour: What Does a Chief Information Security Officer Do? 5 Key Roles

Explore the roles of a Chief Information Security Officer in today's cybersecurity landscape. Watch our webinar & learn how they protect your information.
Start Reading