Skip to main content

Blog

Scoping Your IT Audit Based on Risk

Wednesday, March 20, 2019

Scoping Your IT Audit Based on Risk

"Scoping your IT Audit based on risk" is a phrase that’s thrown around a lot by IT Audit companies and examiners, but what does it really mean? How do you know if your IT Audit is truly risk-based, or if it’s based on an auditor’s idea of what security ought to be?

Read More...

Categories: Blog

A Guide to Performing Internal Social Engineering Testing

Wednesday, March 13, 2019

A Guide to Performing Internal Social Engineering Testing

Social engineering testing more than once a year is proven to be a beneficial way to keep employees alert and hold them responsible for their actions. Since hiring regular testing throughout the year is not an option for everyone, let’s go through some options for performing your own internal social...

Read More...

Categories: Blog

{TTS Webinar} Third Party and Fourth Party Management

Friday, March 1, 2019

Recording available. In recent years, financial institutions have seen a significant amount of new guidance on third party risk management and new terms coined such as Fourth Party Management. We will explore best practices for Vendor Management, Third Party Risk Management, Fourth Party Management ...

Read More...

Categories: Webinars, Webinar

{Download} Eight Emergency Preparedness Testing Scenarios

Thursday, February 28, 2019

{Download} Eight Emergency Preparedness Testing Scenarios

Engage your team and test your emergency preparedness with eight testing scenarios. Scenarios cover a variety of situations, including malware attack, unknown media,  physical security, power outage, ransomware attack, and website hack.  Each scenario includes:   - Ground Rul...

Read More...

Categories: Blog

{Cyber Byte} Penetration Testing

Friday, February 22, 2019

{Cyber Byte} Penetration Testing

This CyberByte video will crack the code on the Penetration Test. Learn how to properly scope a test, the penetration test process, how to choose the right test, and variations in testing.

Read More...

Categories: Blog, Videos

Sheltered Harbor: A Safe Haven from the Perfect Storm

Wednesday, February 6, 2019

Sheltered Harbor: A Safe Haven from the Perfect Storm

Sheltered Harbor is a relatively new concept that is being realized today to address new and existing cybersecurity threats that could affect the financial sector on a massive scale. The idea is to create extremely secure (and segmented) backups of financial data across the financial sector with the...

Read More...

Categories: Blog
Page 6 of 19First   Previous   1  2  3  4  5  [6]  7  8  9  10  Next   Last