Upcoming Cybersecurity Events
Stay informed about our lineup of upcoming events designed to engage, inspire, and enlighten. Join industry experts, thought leaders, and peers as we delve into the latest trends, exchange knowledge, and foster connections.

Frank Hulscher covered Microsoft Entra and Intune in his Tactical Guide to Microsoft 365 earlier this month. Now it's Dylan Kreutzfeldt's turn to get into the nitty-gritty of compliance, security, and governance of data within Microsoft 365 Tenants such as Purview, Exchange, SharePoint, OneDrive, Teams, and Defender.
SBS Speaker: Dylan Kreutzfeldt

Topics:
- Modern Cyber Attacks are Automated
- Current Regulatory Guidance and GLBA Overview
- Use Your IS Risk Assessments to Make Better Decisions
- Responsibilities of an (C)ISO
- How to Build Out an Incident Response Playbook
- Real-World Case Study: Business Email Compromise (BEC)
- Real-World Case Study: Ransomware
SBS Speaker: Cody Delzer

The year is coming to a close, and what a year it was from a cybersecurity perspective!
Join us for the final Cyber Showcase of 2024 as we conduct our first Cybersecurity Stories of the Year Draft, covering the stories that were the most interesting, their impact, and how they might affect cybersecurity going forward.
We will also discuss some ways SBS might be able to help you address some of the issues raised.
SBS Speaker: Bret Rock and John Helland

Topics:
- Modern Cyber Attacks are Automated
- Current Regulatory Guidance and GLBA Overview
- Use Your IS Risk Assessments to Make Better Decisions
- Responsibilities of an Information Security Officer
- How to Build Out an Incident Response Playbook
- Real-World Case Study: Business Email Compromise
- Top 6 Controls to Mitigate Cyber Risk
SBS Speaker: Cody Delzer

- Current industry challenges roundtable
- Latest hot-topic technology and cybersecurity issues, threats, and trends affecting other community banks
- Break down the newest guidance from the FFIEC, other regulatory agencies, and other industry best practices
- Discover ways to implement new technologies, guidance, and best practices in your environment
SBS Speaker: Jon Waldman

Like any double-edged sword, SSO has its own unique set of advantages and disadvantages. On the plus side, SSO enhances security by reducing the number of passwords to manage. It also streamlines user access, boosting productivity. On the flip side, SSO may introduce a single point of failure, meaning if one system goes down, so does access to all others. Additionally, SSO implementation can be complex and costly. Our experts discuss the pros and cons of SSO, the benefits to leveraging SSO properly, and how to implement SSO effectively.
SBS Speaker: Terry Kuxhaus

Topic: Is it Time to Switch to the Cloud?
SBS Speaker: Jon Waldman

Topic: Creating a Culture of Cybersecurity at Your Institution
SBS Speaker: Nick Podhradsky

Topics:
- U.S. Information Security Laws and Regulations
- Information Security Program Components
- Security Awareness Programs
- IT Audit
- Social Engineering
- Preparing for your IT Examinations
- Running Effective IT and Audit Committees
- Learning Lab Exercise with Sherri Davidoff of LMG Security
SBS Speaker: Jon Waldman

Passwords continue to be the bane of users' existence. Humans are bad at passwords – we don't like creating them, we don't like remembering them, and we reuse the heck out of them. How many of you (or your users) have used some variation of Spring2024! for work accounts this year!? The answer: too many!
Cyber criminals know this and take advantage of our poor password tendencies by stealing our passwords, brute-forcing our passwords, or both. And if you're re-using passwords for other websites, like online banking, email, or social media – then you're putting a lot at risk.
In this webinar, we'll explore the art of password compromise and cracking, including how to create strong passwords, how fast passwords can be cracked today, and how to prevent password reuse.
SBS Speaker: Hunther Cockrell

Calling the TRAC community! Join us for the seventh edition of the TRAC User Group. Engage in thought-provoking conversation; get tips, tricks, and time-saving techniques; hear what's on the TRAC roadmap; and have a chance to win prizes. We are looking forward to another fun-filled event!
Don’t miss this innovative school that’s designed by, and especially for, information security officers in the financial industry. This state-of-the-art program will broaden your understanding of the business of banking including key drivers of bank profitability, along with an in depth, interactive and hands-on study of the latest IT security techniques and strategies.


Topics:
- Modern Cyber Attacks are Automated
- Current Regulatory Guidance and GLBA Overview
- Use Your IS Risk Assessments to Make Better Decisions
- Responsibilities of an Information Security Officer
- How to Build Out an Incident Response Playbook
- Real-World Case Study: Business Email Compromise
- Top 6 Controls to Mitigate Cyber Risk
SBS Speaker: Cody Delzer

As most businesses have converted most of their records into electronic format by now, the big question becomes "how long do I need to retain our electronic records?" While the simple answer is "for the same amount of time as you are required to maintain physical records," there are additional complexities to sort through. To top things off, there is very little guidance about how to handle data classification and retention. In this webinar, well explore the best practices and guidance around data classification and document retention, including how to properly store electronic records, for how long, and where to keep your records.
SBS Speaker: Sheryl Ryan
.png?width=600&name=Tile%20-%20NoDate%20-%20Data%20Classification%20and%20Document%20Retention%20(Custom).png)
Although Artificial Intelligence (AI) is not a new concept, it has recently taken the world by storm. Over the past few years, AI has become a focal point at conferences and across various disciplines, touted for its potential to significantly enhance efficiency and effectiveness. It also has been met with great hesitation because of the concerns in security and privacy.
Join us as we address these concerns head-on, exploring the potential pitfalls such as data security issues, ethical dilemmas, and the impact on the market. We’ll also discuss practical, common-sense approaches to leveraging AI responsibly, ensuring your organization can harness its full potential while mitigating risks.
SBS Speaker: Nick Podhradsky and Chad Knutson

Topics:
- Current industry challenges roundtable
- Latest hot-topic technology and cybersecurity issues, threats, and trends affecting other community banks
- Break down the newest guidance from the FFIEC, other regulatory agencies, and other industry best practices
- Discover ways to implement new technologies, guidance, and best practices in your environment
SBS Speaker: Jon Waldman

In this engaging webinar, we delve into the ever-evolving world of financial fraud, focusing on the top scams that individuals and businesses need to be aware of in 2024. We will explore the latest tactics used by fraudsters, leveraging both technology and psychological manipulation. From deceptive deepfakes to stolen identities to old-school check fraud, we'll dissect the threats and provide practical strategies to safeguard your financial well-being. Join us to stay informed, protect your assets, and outsmart the scammers!
SBS Speaker: Laura Zannucci
.png?width=600&name=Tile%20-%20NoDate%20-%20Top%20Financial%20Fraud%20Schemes%20(Custom).png)
Financial institutions face several challenges when completing Suspicious Activity Reports (SARs) for cyber events. Join us for a step-by-step guide on how to fill out SARs, addressing common issues such as identifying suspicious activities, ensuring accuracy, and meeting regulatory deadlines.
We will also explore key compliance obligations and highlight the essential role that IT plays in detecting, reporting, and mitigating cyber events, emphasizing the importance of effective collaboration between compliance and IT teams.
This webinar is ideal for compliance officers, IT professionals, risk management teams, and anyone involved in cybersecurity and regulatory compliance.

With 2024 nearly in the rearview mirror and 2025 on the horizon, lets take a look at the biggest lessons learned from 2024 and what we are relatively likely to expect in 2025. Well discuss the biggest breaches in incidents from the past year, as well as the biggest technology trends and arrivals. Well also highlight what to expect more or less of relating to technology and threats in 2025.
SBS Speaker: Terry Kuxhaus

The first Cyber Showcase of 2025 will focus on TRAC and will include an introduction the brand new NIST CSF TRAC module!
Join us as we discuss the changes made to the platform in 2024, what the roadmap looks like for 2025, and to get your eyes on the brand-new NIST CSF Risk Assessment module!
SBS Speaker: Bret Rock

Without going too far back into history, we know that banks are required to have a formal Information Security Program based on a risk assessment that ensures we protect the CIA of confidential customer information. But that goes all the way back to 1999 and GLBA... what regulatory guidance has changed over the past couple of years that we need to focus on today, and what guidance should we revisit and keep in mind?
SBS Speaker: Cody Delzer

Step into the shoes of a cybercriminal to uncover the tricks of the trade and reveal tactics that attackers use to compromise businesses.
Join us for an eye-opening discussion about advanced penetration testing techniques, social engineering exploits, and methods for identifying and exploiting network and application vulnerabilities. Gain insights from real-world stories and learn proactive strategies to protect your organization from these ever-evolving threats.

Microsoft 365 makes our lives easier, but it's also built to be open and collaborative, which naturally means a higher risk level. As cyber threats evolve and usage of M365 increases, protecting your organization's data has never been more important. Join host Bret Rock and guest Frank Hulscher for this free webinar as they discuss the dos and dont's of M365 security, including a breakdown of the SBS M365 Hardening Assessment and new Cloud Compliance Scan!
SBS Speaker: Bret Rock

In today's digital age, ensuring the security of your data is paramount. Performing an IT audit to validate your Information Security Program controls isn't just a checkbox exercise - it's a critical step to safeguard your organization's most valuable asset: its data. SBS' very own IT Audit Manager, Christy Thomas, will reveal the most frequent findings, share real-world examples, and provide actionable tips to fortify your defenses and protect your organization.
SBS Speaker: Christy Thomas

There are several challenges we all face when considering cyber insurance for the business. Cost of premiums, complexity of the policy, the evolving threats, and limted resources to implement measures to lower insurance costs. Addressing these challenges requires strong risk assessments and careful selection of policies. Learn how to turn cyber insurance into a strategic asset. We'll explore ways to lower risks, boost compliance, and cut insurance costs by choosing the right policies and aligning with industry standards. Equip your organization to better handle the ever-changing cyber threat landscape.

Vendor management can be a real challenge, but it's essential to get it right.
Feeling overwhelmed?
Join host Bret Rock and guest Laura Zannucci, along with some special guests, as they dive into the world of vendor management in 2025. Discover how the SBS Vendor Management as a Service offering has helped many organizations streamline their vendor management processes while ensuring everything runs smoothly!
SBS Speaker: Bret Rock

SBS conducts nearly 1000 network security engagements per year across the US, ranging from individual penetration tests or vulnerability assessments to full-blown red team engagements, for businesses of all shapes, sizes, and industries. In this webinar, our network security experts (our hacker team!) will take you beyond the standard vulnerability assessment and penetration test to share with you the different ways and tests you should be considering to keep them and the real hackers out of your networks. We'll talk about everything from VAs and PTs to red team assessments, web application assessments, password audits, API security testing, and more!
SBS Speaker: Dylan Smith
![6758708670da6728ac0b21e7[1]](https://sbscyber.com/hs-fs/hubfs/Images/WebinarImages/6758708670da6728ac0b21e7%5B1%5D.png?width=600&name=6758708670da6728ac0b21e7%5B1%5D.png)
In today's fast-paced and unpredictable business environment, the ability to quickly recover from disruptions is crucial. Join us for an insightful webinar where we delve into the critical importance of regularly testing your business resilience plans, including your business continuity plan (BCP), disaster recovery plan, pandemic preparedness plan, and incident response plan (IRP). This session will provide you with a comprehensive understanding of why these tests are essential and how they can safeguard your organization against unforeseen events.
SBS Speaker: Shane Daniel

Nearly every business today is incredibly reliant on vendors to run our day-to-day operations, especially if we are connected to the internet. But we've also experienced more and more outages and breaches at the hands of our vendors recently. So how do we handle this risk? Vendor management of course! Regulated businesses have guidance to follow, from banking regulations to NIST CSF to SOC Reports. Vendor (or supply chain) risk management is a staple in the world of cybersecurity. But how do you do more than just check the box? By taking a risk management approach, of course!
SBS Speaker: Laura Zannucci

From an IT and Information Security perspective, financial institutions are required to perform four (4) major risk assessments. This webinar will cover each of these risk assessments, including not just HOW to perform these risk assessments, but WHY we WANT to perform them (the objective!). Additionally, you have to perform these risk assessments regardless, so let's talk about how to make them VALUABLE and not just a thing to check off the list.
Any regulated business or organization that truly values cybersecurity will gain insightful knowledge into how to truly quantify, measure, and manage risk using these methods.
SBS Speaker: Cody Delzer
.png?width=600&name=2025_SBSIWebinars_April_NoDate%20(Custom).png)
Book a Speaker!
We are excited to have the opportunity to help you find the perfect speaker for your event!
Hear From Our Attendees
What would you like to do next?

