Skip to main content

Webinars


Hacker Hours

Hacker Hour webinars are a series of free webinars hosted by SBS CyberSecurity. Unlike paid webinars, our free Hacker Hours aim to discuss banking issues and trends in an open format. Attendees are encouraged to join the conversation and get their questions answered. SBS will also offer products and services to help financial institutions with these specific issues.

Request Password


{Hacker Hour} Getting Caught Up In The Dark Web

Date: 6/27/2018
{Hacker Hour} Getting Caught Up In The Dark Web

Date: Wednesday, Jun 27, 2018
Time: 2:00 PM - 3:00 PM CDT
Price: Free
Time not work for you? That's ok! Register for the webinar and you will receive the recording.

Description: Research shows that 96% of the internet is not accessible by search engines like Google or Yahoo, and that number is growing at a much faster rate than the surface web. What does that mean for us? 

Join SBS as we get caught up with what is going on in the dark web. We will discuss how the dark web started, who uses it, and why everyone should be aware of what's lurking in it.


Complete this form to register:

Trouble submitting the form? Register at https://attendee.gotowebinar.com/register/6459981948526225153

{Hacker Hour} Brushing Up On Corporate Account Takeover

Date: 5/30/2018
{Hacker Hour} Brushing Up On Corporate Account Takeover

It has been seven years since the term "Corporate Account Take Over" or CATO took the industry by surprise and challenged financial institutions to do more to help secure their small business customers. Is CATO still happening today? You bet it is. 

Join SBS as we review guidance centered on CATO and walk through recent types of CATO that are challenging financial institutions.

{Hacker Hour} Incident Response Round Table

{Hacker Hour} Incident Response Round Table

According to the latest Verizon Data Breach Report, there were over 53,000 security incidents and 2,200 registered data breaches in 2017, which is an increase of about 20% from the year prior.

The increased probability of your organization experiencing a cyber incident enhances the need to create and maintain an incident response plan that can detect, contain, and eliminate the issue, then fully recover business operations. All while minimizing the overall reputational and financial damage to the company.

Join SBS for this free webinar in which we will discuss best practices to write and test your incident response plan.  We will also walk through some common scenarios that should be considered in your plan.

{Hacker Hour} Taking Cybersecurity From the Basement to the Boardroom

{Hacker Hour} Taking Cybersecurity From the Basement to the Boardroom

Regulators have made it clear that cybersecurity risk management and oversight is ultimately the responsibility of the Board of Directors. In theory, it makes sense for the board to be interested and engaged in what is going on in cybersecurity, however, that is not the case in some situations. 

For this Hacker Hour, we went straight to the source. We asked a selection of past Hacker Hour attendees to share the most common issues they struggle with when communicating cybersecurity needs to their Board. The responses fell into three main categories: 

  • Frequency of FFIEC Cybersecurity Assessment completion and utilization of risk assessment data. 
  • Information that should be provided to the Board on a consistent basis. 
  • Tips for engaging and educating the Board. 

Join this month's Hacker Hour as we discuss how to boost cybersecurity from its hiding spot in the basement to a consistent topic in the boardroom.

{Hacker Hour} Defining and Refining Your Information Security Program

{Hacker Hour} Defining and Refining Your Information Security Program

A written Information Security Program is required for organizations that are subject to GLBA scrutiny, however, it is also the linchpin for ANY organization to successfully protect sensitive data. Join SBS as we discuss the key components of a strong Information Security Program and explore the issues organizations have in designing and maintaining their program. We will also have a conversation about if and where Virtual CISO services could fit into your business. 

All attendees will receive an example blueprint of an Information Security Program as well as an example GLBA report.

{Hacker Hour} Understanding Penetration Testing

{Hacker Hour} Understanding Penetration Testing

Penetration testing continues to be a crucial component of a strong information security program, but not all penetration tests are created equal. It is crucial that your organization understands what value to expect from the testing. 

Join SBS as we walk step by step through the penetration testing process and discuss how your organization can be confident that you are getting value out of your current penetration testing program. We will also address the difference between a traditional penetration test and more modern approaches.

{Hacker Hour} Cybersecurity Lessons Learned in 2017

{Hacker Hour} Cybersecurity Lessons Learned in 2017

From the time the ball dropped to ring in the new year until you completed your final Cyber Monday purchase, cybersecurity breaches have been a staple on your newsfeed. What stands out with the cyber events of 2017 has been the sheer number of people affected. Millions of consumers had their personal information compromised and no industry was safe from experiencing a breach. What can you do to keep your organization out of the news and your customer data safe? 

Join SBS as we review the top five cybersecurity events of 2017 and what we can learn from them. 

{Hacker Hour} Business Continuity: Plan, Implement, Test

{Hacker Hour} Business Continuity: Plan, Implement, Test

Business Continuity Planning continues to be a point of focus during the examination process. This webinar will discuss the first steps in conducting your Business Impact Analysis (BIA), how to structure your plan, and what you can do to test your program.

{Hacker Hour} Security Awareness Round Table

{Hacker Hour} Security Awareness Round Table

SBS is celebrating National Cybersecurity Awareness Month by hosting a special security awareness round table hacker hour. Join us for an interactive discussion focused on building a stronger security culture for your Board of Directors, employees, and customers. Throughout the webinar we will document the innovative ways others have developed their security awareness program and share the results with everyone that registers.

SBS Resources: 

{Special Report Hacker Hour} Equifax Data Breach: Lessons Learned

Date: 9/15/17
{Special Report Hacker Hour} Equifax Data Breach: Lessons Learned

Request a Password | View Webinar

With 143 million consumers affected and over 200 thousand credit cards compromised, the latest Equifax breach is a hot topic for all consumers and businesses. Join SBS for this special HOT TOPIC Hacker Hour. We will discuss the current facts of the breach, what lead up to it, and what you should think about in response. As part of our discussion, we would like to hear innovative ideas and suggestions from attendees on both lessons learned and fraud protection. To ensure you get all the information you need, time will be provided for you to ask any questions you may have.

SBS Resources:

{Hacker Hour} Five Pitfalls of Vendor Management

Date: 9/27/17
{Hacker Hour} Five Pitfalls of Vendor Management

Many of us rely on third party vendors for IT or security products and services that enhance the way that we do business with our client base. Unfortunately, some of the biggest breaches that we have seen have been at the hands of third party vendors.

Join SBS and learn about common issues that are inherent in a vendor management program and discuss tips and tricks to ensure that you have a program that you can be proud of.

SBS Resources: 

{Hacker Hour} Patch Management- Defense Against the Dark Arts

Date: 8/23/2017
{Hacker Hour} Patch Management- Defense Against the Dark Arts

A Patch Management Program has always been one part of a solid Information Security Program. In today's security world it is one of the most important parts of a company's layered security approach. An organization can sustain extreme damage by falling victim to the dark art of hacking with only one out of date system, endpoint, or software.

This webinar will discuss what a Patch Management Program looks like, what to look for in automated patch solutions, and implementing an effective testing program.

{Hacker Hour} Data Breach - Now what from a legal perspective?

Date: 7/26/2017
{Hacker Hour} Data Breach - Now what from a legal perspective?

Description: Rarely a day goes by without news about a cybersecurity incident affecting a national company. Fraudsters are targeting companies of all kinds and sizes with the goal of divesting companies of their money and confidential information. This presentation will discuss current cybersecurity issues through the lens of real case studies, and will specifically cover: current threats, liability issues, insurance coverage, and mitigating cybersecurity risk.

Special Guest! John Lande is a shareholder practicing in the area of civil litigation with the Dickinson Law Firm in Des Moines. He has experience with matters involving banking and financial regulation, cybersecurity, internal investigations, construction, business dissolution, bankruptcy and collections, and local government. John regularly works with clients already involved in litigation, and clients who are trying to avoid future litigation.

 

{Hacker Hour} Incident Response Round Table

Date: 6/28/17
{Hacker Hour} Incident Response Round Table

One of the best ways to train key employees on your incident response team is to conduct a walk through or functional test of the current incident response plan. Join SBS for this round table discussion covering typical cybersecurity incidents that you should be ready for and share your ideas on how to handle these events. SBS will share how we are helping organizations create and maintain a good incident response plan/process.


Webinars

{Webinar} Incident Response and Forensics

Date: 7/19/18
{Webinar} Incident Response and Forensics
Knowing what threats are realistic for your institution and how to detect them is a challenging task. In this session we will explore possible threats that we should be prepared for and how to build a program to protect against them.

{Webinar} ATM Cashout Scams

Date: 7/12/18
{Webinar} ATM Cashout Scams
Cybercriminals know ATMs are loaded with cash and are investing significant resources in exploiting systems to extract the money. This session is intended to ensure that ATM security has moved up on your radar and been properly integrated into your risk assessment program.

{Webinar} 25 Baseline Controls Banks Struggle to Implement

Date: 6/7/18
{Webinar} 25 Baseline Controls Banks Struggle to Implement
SBS has analyzed and identified the top 25 most common baseline controls not implemented by financial institutions. These are controls that financial institutions MUST complete regardless of their inherent risk score. This session reviews these 25 controls, as well as practical solutions your institution can use to implement these controls.

{Webinar} The Evolution of Ransomware

Date: 6/14/18
{Webinar} The Evolution of Ransomware
Ransomware is evolving from a wallet stealing threat to a weapon of mass destruction that has the power to cripple businesses or even countries. Join us in this discussion to learn about trending issues with ransomware and best practices to prepare for an attack.

{Webinar} Ransomware Expands

Date: 05/25/2018
{Webinar} Ransomware Expands
Join us to recap the statistics related to ransomware and learn how to prepare for this growing threat. Numerous published best practices will be reviewed to assist our institutions to build stronger defenses. Lessons learned from case studies captured from real-world ransomware tragedies will be reflected on.

{Webinar} FFIEC Mobile Services Guidance Review

Date: 5/10/2018
{Webinar} FFIEC Mobile Services Guidance Review
In addition to FFIEC guidance, we will explore applied risk management concepts for mobile banking solutions. Focus will include Mobile Risk Assessments, integration into Information Security Programs, Third Party Risk Management, and effective IT Auditing.

{Webinar} Regulatory Pressure on Third Party Management

{Webinar} Regulatory Pressure on Third Party Management
FFIEC Cybersecurity Assessments Tool encourages financial institutions to expand questioning around third party risk management practices and suggests more rigorous oversight. This webinar will explore best practices for Vendor Management, Third Party Risk Management, and Customer Risk Management.

Demos

{Demo} Automate Your IT Risk Assessment

{Demo} Automate Your IT Risk Assessment
Demos are held on Thursday of each week. You can pick a date that works for you upon registering. Join this webinar to discover the power of TRAC and easily create your company's detailed IT risk assessment. Develop your inherent risk, residual risk, and future risk scores that help make sound business decisions.

{Demo} Automate Your Vendor Management Program

{Demo} Automate Your Vendor Management Program
Demos are held on Thursday of each week. You can pick a date that works for you upon registering. Join this webinar to discover the power of TRAC and how it centralizes and manages all of your vendor relationships. We will walk through the risk assessment and selection process, and discuss how TRAC can instantly improves your ability to manage vendors.

{Demo} KnowBe4: New School Security Awareness

{Demo} KnowBe4: New School Security Awareness
Demos are held on Wednesday of each week. You can pick a date that works for you upon registering. Join this webinar to view a demo of the software and learn how SBS can partner with you to create a stronger security awareness program.