Upcoming Cybersecurity Events
Stay tuned for our exciting lineup of upcoming events designed to engage, inspire, and inform. Join industry experts, thought leaders, and your peers as we explore the latest trends, share knowledge, and build connections.
Discover What's Next: Our Event Lineup
Does your network look a bit like Frankenstein's monster, with some really old elements, some modern elements, some physical servers, some virtual servers, and some cloud-hosted parts? If so, let's talk about what the next five years of corporate networks are going to look like. Many businesses are moving from traditional on-premise networking architectures to cloud-hosted networking solutions. From the best next-gen security controls to more flexibility around remote users and devices, the reasons for exploring cloud-hosted networks are plentiful. In this webinar, we will explore the pros, cons, risks, and rewards of cloud-hosted environments and what you need to know if you're looking to shift to the cloud.
SBS Speaker: Shane Daniel
Frank Hulscher covered Microsoft Entra and Intune in his Tactical Guide to Microsoft 365 earlier this month. Now it's Dylan Kreutzfeldt's turn to get into the nitty-gritty of compliance, security, and governance of data within Microsoft 365 Tenants such as Purview, Exchange, SharePoint, OneDrive, Teams, and Defender.
SBS Speaker: Dylan Kreutzfeldt
Topics:
- Modern Cyber Attacks are Automated
- Current Regulatory Guidance and GLBA Overview
- Use Your IS Risk Assessments to Make Better Decisions
- Responsibilities of an (C)ISO
- How to Build Out an Incident Response Playbook
- Real-World Case Study: Business Email Compromise (BEC)
- Real-World Case Study: Ransomware
SBS Speaker: Cody Delzer
Topics:
- Modern Cyber Attacks are Automated
- Current Regulatory Guidance and GLBA Overview
- Use Your IS Risk Assessments to Make Better Decisions
- Responsibilities of an Information Security Officer
- How to Build Out an Incident Response Playbook
- Real-World Case Study: Business Email Compromise
- Top 6 Controls to Mitigate Cyber Risk
SBS Speaker: Cody Delzer
- Current industry challenges roundtable
- Latest hot-topic technology and cybersecurity issues, threats, and trends affecting other community banks
- Break down the newest guidance from the FFIEC, other regulatory agencies, and other industry best practices
- Discover ways to implement new technologies, guidance, and best practices in your environment
SBS Speaker: Jon Waldman
Like any double-edged sword, SSO has its own unique set of advantages and disadvantages. On the plus side, SSO enhances security by reducing the number of passwords to manage. It also streamlines user access, boosting productivity. On the flip side, SSO may introduce a single point of failure, meaning if one system goes down, so does access to all others. Additionally, SSO implementation can be complex and costly. Our experts discuss the pros and cons of SSO, the benefits to leveraging SSO properly, and how to implement SSO effectively.
SBS Speaker: Terry Kuxhaus
Topic: Is it Time to Switch to the Cloud?
SBS Speaker: Jon Waldman
As the FFIEC Cybersecurity Assessment Tool (CAT) approaches its sunset, financial institutions must navigate the transition to alternative cybersecurity frameworks. This comprehensive webinar will provide you with the essential updates and practical guidance needed to ensure a smooth transition and maintain robust cybersecurity practices. Laura Zannucci will delve into the broader implications for financial institutions, explore alternative cybersecurity frameworks, and address your questions and concerns.
Topic: Creating a Culture of Cybersecurity at Your Institution
SBS Speaker: Nick Podhradsky
Topics:
- U.S. Information Security Laws and Regulations
- Information Security Program Components
- Security Awareness Programs
- IT Audit
- Social Engineering
- Preparing for your IT Examinations
- Running Effective IT and Audit Committees
- Learning Lab Exercise with Sherri Davidoff of LMG Security
SBS Speaker: Jon Waldman
Passwords continue to be the bane of users' existence. Humans are bad at passwords – we don't like creating them, we don't like remembering them, and we reuse the heck out of them. How many of you (or your users) have used some variation of Spring2024! for work accounts this year!? The answer: too many!
Cyber criminals know this and take advantage of our poor password tendencies by stealing our passwords, brute-forcing our passwords, or both. And if you're re-using passwords for other websites, like online banking, email, or social media – then you're putting a lot at risk.
In this webinar, we'll explore the art of password compromise and cracking, including how to create strong passwords, how fast passwords can be cracked today, and how to prevent password reuse.
SBS Speaker: Hunther Cockrell
Calling the TRAC community! Join us for the seventh edition of the TRAC User Group. Engage in thought-provoking conversation; get tips, tricks, and time-saving techniques; hear what's on the TRAC roadmap; and have a chance to win prizes. We are looking forward to another fun-filled event!
Join us and walk through a cybersecurity culture checklist to help you measure and improve your organization’s cybersecurity culture. We’ll explore key strategies for embedding these practices into your business, moving you closer to a cyber-savvy culture.
Don’t miss this innovative school that’s designed by, and especially for, information security officers in the financial industry. This state-of-the-art program will broaden your understanding of the business of banking including key drivers of bank profitability, along with an in depth, interactive and hands-on study of the latest IT security techniques and strategies.
SBS Speaker: Nick PodhradskyTopics:
- Modern Cyber Attacks are Automated
- Current Regulatory Guidance and GLBA Overview
- Use Your IS Risk Assessments to Make Better Decisions
- Responsibilities of an Information Security Officer
- How to Build Out an Incident Response Playbook
- Real-World Case Study: Business Email Compromise
- Top 6 Controls to Mitigate Cyber Risk
SBS Speaker: Cody Delzer
As most businesses have converted most of their records into electronic format by now, the big question becomes "how long do I need to retain our electronic records?" While the simple answer is "for the same amount of time as you are required to maintain physical records," there are additional complexities to sort through. To top things off, there is very little guidance about how to handle data classification and retention. In this webinar, well explore the best practices and guidance around data classification and document retention, including how to properly store electronic records, for how long, and where to keep your records.
SBS Speaker: Sheryl Ryan
Although Artificial Intelligence (AI) is not a new concept, it has recently taken the world by storm. Over the past few years, AI has become a focal point at conferences and across various disciplines, touted for its potential to significantly enhance efficiency and effectiveness. It also has been met with great hesitation because of the concerns in security and privacy.
Join us as we address these concerns head-on, exploring the potential pitfalls such as data security issues, ethical dilemmas, and the impact on the market. We’ll also discuss practical, common-sense approaches to leveraging AI responsibly, ensuring your organization can harness its full potential while mitigating risks.
SBS Speaker: Nick Podhradsky and Chad Knutson
Topics:
- Current industry challenges roundtable
- Latest hot-topic technology and cybersecurity issues, threats, and trends affecting other community banks
- Break down the newest guidance from the FFIEC, other regulatory agencies, and other industry best practices
- Discover ways to implement new technologies, guidance, and best practices in your environment
SBS Speaker: Jon Waldman
In this engaging webinar, we delve into the ever-evolving world of financial fraud, focusing on the top scams that individuals and businesses need to be aware of in 2024. We will explore the latest tactics used by fraudsters, leveraging both technology and psychological manipulation. From deceptive deepfakes to stolen identities to old-school check fraud, we'll dissect the threats and provide practical strategies to safeguard your financial well-being. Join us to stay informed, protect your assets, and outsmart the scammers!
SBS Speaker: Laura Zannucci
Financial institutions face several challenges when completing Suspicious Activity Reports (SARs) for cyber events. Join us for a step-by-step guide on how to fill out SARs, addressing common issues such as identifying suspicious activities, ensuring accuracy, and meeting regulatory deadlines.
We will also explore key compliance obligations and highlight the essential role that IT plays in detecting, reporting, and mitigating cyber events, emphasizing the importance of effective collaboration between compliance and IT teams.
This webinar is ideal for compliance officers, IT professionals, risk management teams, and anyone involved in cybersecurity and regulatory compliance.
With 2024 nearly in the rearview mirror and 2025 on the horizon, lets take a look at the biggest lessons learned from 2024 and what we are relatively likely to expect in 2025. Well discuss the biggest breaches in incidents from the past year, as well as the biggest technology trends and arrivals. Well also highlight what to expect more or less of relating to technology and threats in 2025.
SBS Speaker: Terry Kuxhaus
Book a Speaker!
We are excited to have the opportunity to help you find the perfect speaker for your event!