Skip to main content

Webinars

Want to view a Private Webinar? Just contact us.

Hacker Hours

Hacker Hour webinars are a series of free webinars hosted by SBS CyberSecurity. Unlike paid webinars, our free Hacker Hours aim to discuss banking issues and trends in an open format. Attendees are encouraged to join the conversation and get their questions answered. SBS will also offer products and services to help financial institutions with these specific issues.

Request Password


{Hacker Hour} Incident Response Round Table

{Hacker Hour} Incident Response Round Table

Date: Thursday, April 26
Time: 2:00 PM - 3:00 PM CDT
Price: Free
Date not work for you? That's ok! Registrants will receive the webinar recording. 

Description:

According to the latest Verizon Data Breach Report, there were over 53,000 security incidents and 2,200 registered data breaches in 2017, which is an increase of about 20% from the year prior.

The increased probability of your organization experiencing a cyber incident enhances the need to create and maintain an incident response plan that can detect, contain, and eliminate the issue, then fully recover business operations. All while minimizing the overall reputational and financial damage to the company.

Join SBS for this free webinar in which we will discuss best practices to write and test your incident response plan.  We will also walk through some common scenarios that should be considered in your plan.


Complete this form to register:

Trouble with the form? Register at https://register.gotowebinar.com/#register/8116519359619215362.

{Hacker Hour} Taking Cybersecurity From the Basement to the Boardroom

{Hacker Hour} Taking Cybersecurity From the Basement to the Boardroom

Regulators have made it clear that cybersecurity risk management and oversight is ultimately the responsibility of the Board of Directors. In theory, it makes sense for the board to be interested and engaged in what is going on in cybersecurity, however, that is not the case in some situations. 

For this Hacker Hour, we went straight to the source. We asked a selection of past Hacker Hour attendees to share the most common issues they struggle with when communicating cybersecurity needs to their Board. The responses fell into three main categories: 

  • Frequency of FFIEC Cybersecurity Assessment completion and utilization of risk assessment data. 
  • Information that should be provided to the Board on a consistent basis. 
  • Tips for engaging and educating the Board. 

Join this month's Hacker Hour as we discuss how to boost cybersecurity from its hiding spot in the basement to a consistent topic in the boardroom.

{Hacker Hour} Defining and Refining Your Information Security Program

{Hacker Hour} Defining and Refining Your Information Security Program

A written Information Security Program is required for organizations that are subject to GLBA scrutiny, however, it is also the linchpin for ANY organization to successfully protect sensitive data. Join SBS as we discuss the key components of a strong Information Security Program and explore the issues organizations have in designing and maintaining their program. We will also have a conversation about if and where Virtual CISO services could fit into your business. 

All attendees will receive an example blueprint of an Information Security Program as well as an example GLBA report.

{Hacker Hour} Understanding Penetration Testing

{Hacker Hour} Understanding Penetration Testing

Penetration testing continues to be a crucial component of a strong information security program, but not all penetration tests are created equal. It is crucial that your organization understands what value to expect from the testing. 

Join SBS as we walk step by step through the penetration testing process and discuss how your organization can be confident that you are getting value out of your current penetration testing program. We will also address the difference between a traditional penetration test and more modern approaches.

{Hacker Hour} Cybersecurity Lessons Learned in 2017

{Hacker Hour} Cybersecurity Lessons Learned in 2017

From the time the ball dropped to ring in the new year until you completed your final Cyber Monday purchase, cybersecurity breaches have been a staple on your newsfeed. What stands out with the cyber events of 2017 has been the sheer number of people affected. Millions of consumers had their personal information compromised and no industry was safe from experiencing a breach. What can you do to keep your organization out of the news and your customer data safe? 

Join SBS as we review the top five cybersecurity events of 2017 and what we can learn from them. 

{Hacker Hour} Business Continuity: Plan, Implement, Test

{Hacker Hour} Business Continuity: Plan, Implement, Test

Business Continuity Planning continues to be a point of focus during the examination process. This webinar will discuss the first steps in conducting your Business Impact Analysis (BIA), how to structure your plan, and what you can do to test your program.

{Hacker Hour} Security Awareness Round Table

{Hacker Hour} Security Awareness Round Table

SBS is celebrating National Cybersecurity Awareness Month by hosting a special security awareness round table hacker hour. Join us for an interactive discussion focused on building a stronger security culture for your Board of Directors, employees, and customers. Throughout the webinar we will document the innovative ways others have developed their security awareness program and share the results with everyone that registers.

SBS Resources: 

{Special Report Hacker Hour} Equifax Data Breach: Lessons Learned

Date: 9/15/17
{Special Report Hacker Hour} Equifax Data Breach: Lessons Learned

Request a Password | View Webinar

With 143 million consumers affected and over 200 thousand credit cards compromised, the latest Equifax breach is a hot topic for all consumers and businesses. Join SBS for this special HOT TOPIC Hacker Hour. We will discuss the current facts of the breach, what lead up to it, and what you should think about in response. As part of our discussion, we would like to hear innovative ideas and suggestions from attendees on both lessons learned and fraud protection. To ensure you get all the information you need, time will be provided for you to ask any questions you may have.

SBS Resources:

{Hacker Hour} Five Pitfalls of Vendor Management

Date: 9/27/17
{Hacker Hour} Five Pitfalls of Vendor Management

Many of us rely on third party vendors for IT or security products and services that enhance the way that we do business with our client base. Unfortunately, some of the biggest breaches that we have seen have been at the hands of third party vendors.

Join SBS and learn about common issues that are inherent in a vendor management program and discuss tips and tricks to ensure that you have a program that you can be proud of.

SBS Resources: 

{Hacker Hour} Patch Management- Defense Against the Dark Arts

Date: 8/23/2017
{Hacker Hour} Patch Management- Defense Against the Dark Arts

A Patch Management Program has always been one part of a solid Information Security Program. In today's security world it is one of the most important parts of a company's layered security approach. An organization can sustain extreme damage by falling victim to the dark art of hacking with only one out of date system, endpoint, or software.

This webinar will discuss what a Patch Management Program looks like, what to look for in automated patch solutions, and implementing an effective testing program.

{Hacker Hour} Data Breach - Now what from a legal perspective?

Date: 7/26/2017
{Hacker Hour} Data Breach - Now what from a legal perspective?

Description: Rarely a day goes by without news about a cybersecurity incident affecting a national company. Fraudsters are targeting companies of all kinds and sizes with the goal of divesting companies of their money and confidential information. This presentation will discuss current cybersecurity issues through the lens of real case studies, and will specifically cover: current threats, liability issues, insurance coverage, and mitigating cybersecurity risk.

Special Guest! John Lande is a shareholder practicing in the area of civil litigation with the Dickinson Law Firm in Des Moines. He has experience with matters involving banking and financial regulation, cybersecurity, internal investigations, construction, business dissolution, bankruptcy and collections, and local government. John regularly works with clients already involved in litigation, and clients who are trying to avoid future litigation.

 

{Hacker Hour} Incident Response Round Table

Date: 6/28/17
{Hacker Hour} Incident Response Round Table

One of the best ways to train key employees on your incident response team is to conduct a walk through or functional test of the current incident response plan. Join SBS for this round table discussion covering typical cybersecurity incidents that you should be ready for and share your ideas on how to handle these events. SBS will share how we are helping organizations create and maintain a good incident response plan/process.

{Hacker Hour} Status of Vendor Management

Date: 05/24/2017
{Hacker Hour} Status of Vendor Management

Vendor management continues to be one of the most common topics discussed in cybersecurity. Unfortunately, there are a number of struggles with creating and implementing a solid vendor management program.

Join SBS as we discuss the changes that we are seeing in vendor management. We will also take a look at different solutions and programs that are available to help with the vendor management process.

{HACKER HOUR} AUTHENTICATION AND PASSWORD CRACKING

Date: 4/26/17
{HACKER HOUR} AUTHENTICATION AND PASSWORD CRACKING

Passwords are an important layer of security designed to protect your digital identity. Advances in computing technology now allow passwords that were previously considered "strong" to be broken or cracked in a shorter time frame. 

This webinar will discuss the accepted password standards that we see today and talk about what is on the horizon for authentication. We will even show an example of how hackers are able to crack passwords!


Webinars

{Webinar} Ransomware Expands

Date: 05/25/2018
{Webinar} Ransomware Expands
Join us to recap the statistics related to ransomware and learn how to prepare for this growing threat. Numerous published best practices will be reviewed to assist our institutions to build stronger defenses. Lessons learned from case studies captured from real-world ransomware tragedies will be reflected on.

{Webinar} FFIEC Mobile Services Guidance Review

Date: 5/10/2018
{Webinar} FFIEC Mobile Services Guidance Review
In addition to FFIEC guidance, we will explore applied risk management concepts for mobile banking solutions. Focus will include Mobile Risk Assessments, integration into Information Security Programs, Third Party Risk Management, and effective IT Auditing.

{Webinar} Regulatory Pressure on Third Party Management

{Webinar} Regulatory Pressure on Third Party Management
FFIEC Cybersecurity Assessments Tool encourages financial institutions to expand questioning around third party risk management practices and suggests more rigorous oversight. This webinar will explore best practices for Vendor Management, Third Party Risk Management, and Customer Risk Management.

{Webinar} Cybercrime and the Dark Web

{Webinar} Cybercrime and the Dark Web
This webinar will explore the different aspects of the internet, including the surface web, deep web, and dark web. Join us in this session and we will do a live demo of the Dark Web.

{Webinar} Attacking the Human Element

{Webinar} Attacking the Human Element
This discussion will highlight the advancements in cybercrime and social engineering that are targeting our people resources. Best practices will be discussed for processes necessary to improve the weakest links in our institutions.

{Webinar} 2018 Cybersecurity Forcast

{Webinar} 2018 Cybersecurity Forcast
As the year slowly winds down, join us for a review of major information security events in 2017 and a brief look forward at what is to come in 2018. With so much activity in the cybersecurity space, new government regulation, and continued data breach reports; there are many lessons learned and takeaways to reflect on.

Demos

{Demo} Automate Your IT Risk Assessment

{Demo} Automate Your IT Risk Assessment
Demos are held on Thursday of each week. You can pick a date that works for you upon registering. Join this webinar to discover the power of TRAC and easily create your company's detailed IT risk assessment. Develop your inherent risk, residual risk, and future risk scores that help make sound business decisions.

{Demo} Automate Your Vendor Management Program

{Demo} Automate Your Vendor Management Program
Demos are held on Thursday of each week. You can pick a date that works for you upon registering. Join this webinar to discover the power of TRAC and how it centralizes and manages all of your vendor relationships. We will walk through the risk assessment and selection process, and discuss how TRAC can instantly improves your ability to manage vendors.

{Demo} KnowBe4: New School Security Awareness

{Demo} KnowBe4: New School Security Awareness
Demos are held on Wednesday of each week. You can pick a date that works for you upon registering. Join this webinar to view a demo of the software and learn how SBS can partner with you to create a stronger security awareness program.