Upcoming Cybersecurity Events
Stay tuned for our exciting lineup of upcoming events designed to engage, inspire, and inform. Join industry experts, thought leaders, and your peers as we explore the latest trends, share knowledge, and build connections.
Discover What's Next: Our Event Lineup
Does your network look a bit like Frankenstein's monster, with some really old elements, some modern elements, some physical servers, some virtual servers, and some cloud-hosted parts? If so, let's talk about what the next five years of corporate networks are going to look like. Many businesses are moving from traditional on-premise networking architectures to cloud-hosted networking solutions. From the best next-gen security controls to more flexibility around remote users and devices, the reasons for exploring cloud-hosted networks are plentiful. In this webinar, we will explore the pros, cons, risks, and rewards of cloud-hosted environments and what you need to know if you're looking to shift to the cloud.
SBS Speaker: Shane Daniel
Frank Hulscher covered Microsoft Entra and Intune in his Tactical Guide to Microsoft 365 earlier this month. Now it's Dylan Kreutzfeldt's turn to get into the nitty-gritty of compliance, security, and governance of data within Microsoft 365 Tenants such as Purview, Exchange, SharePoint, OneDrive, Teams, and Defender.
SBS Speaker: Dylan Kreutzfeldt
Topics:
- Modern Cyber Attacks are Automated
- Current Regulatory Guidance and GLBA Overview
- Use Your IS Risk Assessments to Make Better Decisions
- Responsibilities of an (C)ISO
- How to Build Out an Incident Response Playbook
- Real-World Case Study: Business Email Compromise (BEC)
- Real-World Case Study: Ransomware
SBS Speaker: Cody Delzer
The year is coming to a close, and what a year it was from a cybersecurity perspective!
Join us for the final Cyber Showcase of 2024 as we conduct our first Cybersecurity Stories of the Year Draft, covering the stories that were the most interesting, their impact, and how they might affect cybersecurity going forward.
We will also discuss some ways SBS might be able to help you address some of the issues raised.
SBS Speaker: Bret Rock and John Helland
Topics:
- Modern Cyber Attacks are Automated
- Current Regulatory Guidance and GLBA Overview
- Use Your IS Risk Assessments to Make Better Decisions
- Responsibilities of an Information Security Officer
- How to Build Out an Incident Response Playbook
- Real-World Case Study: Business Email Compromise
- Top 6 Controls to Mitigate Cyber Risk
SBS Speaker: Cody Delzer
- Current industry challenges roundtable
- Latest hot-topic technology and cybersecurity issues, threats, and trends affecting other community banks
- Break down the newest guidance from the FFIEC, other regulatory agencies, and other industry best practices
- Discover ways to implement new technologies, guidance, and best practices in your environment
SBS Speaker: Jon Waldman
Like any double-edged sword, SSO has its own unique set of advantages and disadvantages. On the plus side, SSO enhances security by reducing the number of passwords to manage. It also streamlines user access, boosting productivity. On the flip side, SSO may introduce a single point of failure, meaning if one system goes down, so does access to all others. Additionally, SSO implementation can be complex and costly. Our experts discuss the pros and cons of SSO, the benefits to leveraging SSO properly, and how to implement SSO effectively.
SBS Speaker: Terry Kuxhaus
Topic: Is it Time to Switch to the Cloud?
SBS Speaker: Jon Waldman
As the FFIEC Cybersecurity Assessment Tool (CAT) approaches its sunset, financial institutions must navigate the transition to alternative cybersecurity frameworks. This comprehensive webinar will provide you with the essential updates and practical guidance needed to ensure a smooth transition and maintain robust cybersecurity practices. Laura Zannucci will delve into the broader implications for financial institutions, explore alternative cybersecurity frameworks, and address your questions and concerns.
Topic: Creating a Culture of Cybersecurity at Your Institution
SBS Speaker: Nick Podhradsky
Topics:
- U.S. Information Security Laws and Regulations
- Information Security Program Components
- Security Awareness Programs
- IT Audit
- Social Engineering
- Preparing for your IT Examinations
- Running Effective IT and Audit Committees
- Learning Lab Exercise with Sherri Davidoff of LMG Security
SBS Speaker: Jon Waldman
Passwords continue to be the bane of users' existence. Humans are bad at passwords – we don't like creating them, we don't like remembering them, and we reuse the heck out of them. How many of you (or your users) have used some variation of Spring2024! for work accounts this year!? The answer: too many!
Cyber criminals know this and take advantage of our poor password tendencies by stealing our passwords, brute-forcing our passwords, or both. And if you're re-using passwords for other websites, like online banking, email, or social media – then you're putting a lot at risk.
In this webinar, we'll explore the art of password compromise and cracking, including how to create strong passwords, how fast passwords can be cracked today, and how to prevent password reuse.
SBS Speaker: Hunther Cockrell
Calling the TRAC community! Join us for the seventh edition of the TRAC User Group. Engage in thought-provoking conversation; get tips, tricks, and time-saving techniques; hear what's on the TRAC roadmap; and have a chance to win prizes. We are looking forward to another fun-filled event!
Top sports teams design plays to leverage their strengths and outmaneuver their opponents. Incident response planning is very similar. You need to ensure your team is on the same page, keep your plays current, and stay agile in the face of the changing cyber landscape.
Join us for this engaging webinar where we will explore the key components of a strong playbook, much like the strategic playbooks used by elite sports teams. We’ll guide you through the step-by-step process of creating a playbook tailored to your organization’s unique needs. Additionally, we’ll review a few common plays or scenarios to include in your incident response playbook.
Whether you’re just starting a playbook or looking to adapt to evolving threats, this webinar will equip you with the tools and insights needed to craft a winning incident response playbook.
Don’t miss this innovative school that’s designed by, and especially for, information security officers in the financial industry. This state-of-the-art program will broaden your understanding of the business of banking including key drivers of bank profitability, along with an in depth, interactive and hands-on study of the latest IT security techniques and strategies.
SBS Speaker: Nick PodhradskyTopics:
- Modern Cyber Attacks are Automated
- Current Regulatory Guidance and GLBA Overview
- Use Your IS Risk Assessments to Make Better Decisions
- Responsibilities of an Information Security Officer
- How to Build Out an Incident Response Playbook
- Real-World Case Study: Business Email Compromise
- Top 6 Controls to Mitigate Cyber Risk
SBS Speaker: Cody Delzer
As most businesses have converted most of their records into electronic format by now, the big question becomes "how long do I need to retain our electronic records?" While the simple answer is "for the same amount of time as you are required to maintain physical records," there are additional complexities to sort through. To top things off, there is very little guidance about how to handle data classification and retention. In this webinar, well explore the best practices and guidance around data classification and document retention, including how to properly store electronic records, for how long, and where to keep your records.
SBS Speaker: Sheryl Ryan
Although Artificial Intelligence (AI) is not a new concept, it has recently taken the world by storm. Over the past few years, AI has become a focal point at conferences and across various disciplines, touted for its potential to significantly enhance efficiency and effectiveness. It also has been met with great hesitation because of the concerns in security and privacy.
Join us as we address these concerns head-on, exploring the potential pitfalls such as data security issues, ethical dilemmas, and the impact on the market. We’ll also discuss practical, common-sense approaches to leveraging AI responsibly, ensuring your organization can harness its full potential while mitigating risks.
SBS Speaker: Nick Podhradsky and Chad Knutson
Topics:
- Current industry challenges roundtable
- Latest hot-topic technology and cybersecurity issues, threats, and trends affecting other community banks
- Break down the newest guidance from the FFIEC, other regulatory agencies, and other industry best practices
- Discover ways to implement new technologies, guidance, and best practices in your environment
SBS Speaker: Jon Waldman
In this engaging webinar, we delve into the ever-evolving world of financial fraud, focusing on the top scams that individuals and businesses need to be aware of in 2024. We will explore the latest tactics used by fraudsters, leveraging both technology and psychological manipulation. From deceptive deepfakes to stolen identities to old-school check fraud, we'll dissect the threats and provide practical strategies to safeguard your financial well-being. Join us to stay informed, protect your assets, and outsmart the scammers!
SBS Speaker: Laura Zannucci
Financial institutions face several challenges when completing Suspicious Activity Reports (SARs) for cyber events. Join us for a step-by-step guide on how to fill out SARs, addressing common issues such as identifying suspicious activities, ensuring accuracy, and meeting regulatory deadlines.
We will also explore key compliance obligations and highlight the essential role that IT plays in detecting, reporting, and mitigating cyber events, emphasizing the importance of effective collaboration between compliance and IT teams.
This webinar is ideal for compliance officers, IT professionals, risk management teams, and anyone involved in cybersecurity and regulatory compliance.
With 2024 nearly in the rearview mirror and 2025 on the horizon, lets take a look at the biggest lessons learned from 2024 and what we are relatively likely to expect in 2025. Well discuss the biggest breaches in incidents from the past year, as well as the biggest technology trends and arrivals. Well also highlight what to expect more or less of relating to technology and threats in 2025.
SBS Speaker: Terry Kuxhaus
The first Cyber Showcase of 2025 will focus on TRAC and will include an introduction the brand new NIST CSF TRAC module!
Join us as we discuss the changes made to the platform in 2024, what the roadmap looks like for 2025, and to get your eyes on the brand-new NIST CSF Risk Assessment module!
SBS Speaker: Bret Rock
Without going too far back into history, we know that banks are required to have a formal Information Security Program based on a risk assessment that ensures we protect the CIA of confidential customer information. But that goes all the way back to 1999 and GLBA... what regulatory guidance has changed over the past couple of years that we need to focus on today, and what guidance should we revisit and keep in mind?
SBS Speaker: Cody Delzer
In today's digital age, ensuring the security of your data is paramount. Performing an IT audit to validate your Information Security Program controls isn't just a checkbox exercise - it's a critical step to safeguard your organization's most valuable asset: its data. SBS' very own IT Audit Manager, Christy Thomas, will reveal the most frequent findings, share real-world examples, and provide actionable tips to fortify your defenses and protect your organization.
SBS Speaker: Christy Thomas
If you use the internet to do business, and your employee and customers can access your technology from the internet remember, so can a hacker! While hackers might not be specifically targeting your business, they are specifically targeting vulnerable networks, web applications, websites, and anything else they can see from the internet. Be sure you know your online technology is secure before a hacker shows you otherwise!SBS conducts nearly 1000 Network Security engagements per year across the US, ranging from individual PenTests or Vulnerability Assessments s to full-blown Red Team engagements, for businesses of all shapes, sizes, and industries. In this webinar, our SBS CyberSecurity network security experts (our hacker team!) will take you beyond just the standard Vulnerability Assessment and Penetration Test to share with you the different ways and tests you should be considering to keep them and the real hackers out of your networks. Well talk about everything from VAs and PTs to Red Team Assessments, Web Application Assessments, Password Audits, API Security Testing, and more!
SBS Speaker: Dylan Smith
Book a Speaker!
We are excited to have the opportunity to help you find the perfect speaker for your event!