Skip to main content

Resources

2019 National Cybersecurity Awareness Month at SBS

NCSAM Logo

Quick Links: Own IT | Secure IT | Protect IT

 

Now in its 16th year, National Cyber Security Awareness Month (NCSAM) continues to build momentum and impact with the ultimate goal of providing all Americans with the information they need to stay safer and more secure online. We are proud to support this far-reaching online safety awareness and education initiative which is co-led by the National Cyber Security Alliance (NCSA) and the  Cybersecurity and Infrastructure Agency (CISA) of the U.S. Department of Homeland Security


As an NCSAM Champion, SBS will be sharing a variety of cybersecurity downloads, blog posts, and tips. Be sure to follow us on LinkedIn, Facebook, and Twitter, and join our mailing list so you don't miss any updates!

 

Webinar: Own, Secure, and Protect Your ISP

Description: The theme for this year's National Cybersecurity Awareness Month is Own IT.  Secure IT. Protect IT.  Join SBS as we discuss how a comprehensive and repeatable Information Security Program (ISP) is a map of exactly how your organization owns, secures, and protects your confidential customer information, computer systems, networks, and applications. We will look closely at the three critical components of an ISP - IT Risk Assessment, Vendor Management, and Business Continuity Planning - and share common solutions to help you mature your program. 

Request Password | View Webinar


 

Own IT.

Own IT.

Internet-based devices are present in every aspect of our lives: at home, school, work, and on the go. The constant connection provides opportunities for innovation and modernization but also presents opportunities for potential cybersecurity threats that can compromise your most important data. 

 

 

SBS Resources - Own Responsibility:

  • {Blog} Is Your BYOD Policy Designed to Fail?: Managing information security for a mobile workforce takes a strategic effort prior to allowing employees access to company information via personally owned devices. Make sure your BYOD policy contains these critical components.
  • {Blog} The Ransom of American Towns: Reports of yet another government entity being attacked by ransomware seem to appear in the news so often, it feels like reading the lyrics to Johnny Cash’s “I’ve Been Everywhere.” While the ransomware epidemic has targeted large metropolitan areas such as Atlanta and Baltimore, smaller community infrastructures appear to be the latest lucrative sweet spot for cybercriminal activities.
  • {Blog} Cybersecurity Primer for Directors: An understanding of cybersecurity is rarely a pre-requisite for a Director, but perhaps it’s time to reconsider the technical knowledge of bank Directors. Today, Board members may understand IT threats at a high-level, but most Directors are not sure what types of questions to ask the Information Security Officer in the first place.
  • {Infographic} 10 Key Ideas to Build a Cybersecurity Culture: Most organizations today realize that they can have the best security money can buy, but if one employee clicks a link or downloads an attachment from an email, all of that security is thrown out the window.
  • {Download} You are a Technology Company: As your organization is reviewing its strategic plans, take a moment to evaluate the use of technology as a core component of your business. If most of you are being honest with yourselves you will realize that your organization has shifted from performing a service for a customer and using technology to make that service more convenient to truly operating as a technology company that offers your customer a specific service. This guide outlines three steps you can take to shift your thinking when it comes to viewing your organization as a technology company. 
  • {Education} SBS Institute Certifications: Are you new to the banking industry? Are you seasoned in banking, but have taken on new cybersecurity responsibilities? The SBS Institute has just the certifications for you. Learn how our uniquely designed certifications can help you get ahead. 
  • {Webinar} Don't Fall Behind in Your Cybersecurity Training: This quick webinar is a no-obligation way to learn more about our online cybersecurity courses and the many benefits of earning a certification built exclusively for the banking industry. See why so many banking professionals rely on SBS Institute for their security training and education. 


NCSAM Resources:


 

Secure IT.

Secure IT

Cybercriminals are very good at getting data from unsuspecting victims, and the methods are getting more sophisticated as technology evolves. Protect against cyber threats by learning about security features available on the equipment and software you use. Apply additional layers of security to your devices – like Multi-Factor Authentication – to better protect your personal information. 

 

 

SBS Resources - Security in Layers:

  • {Blog} What Does the Average Financial Institution Spend on Cybersecurity?:CISOs have found themselves at a disadvantage when directors or executive peers challenge the cost of their cybersecurity spend, since little-to-no peer information is available. Let's take a look at a recent study and industry peer information to evaluate what the average financial institution spends on cybersecurity.
  • {Blog} 10 Tips to Avoid a Phishing Attack: Follow these ten tips and look for the red flags to avoid falling victim to a phishing attack. A good rule to follow is "when in doubt, check it out." Verify a suspicious email with the sender before clicking on any links or downloading an attachment.
  • {Blog} How the Cyber Kill Chain Can Help You Protect Against Attacks: Since we know that you cannot mitigate 100% of risk (not just in terms of cybersecurity, but for anything), defense in depth strategies focus on a layered approach to security. If you put numerous layers of security in place at different points in the flow of data, you stand a better chance to prevent, disrupt, or mitigate an attack. Learn how to utilize the Cyber Kill Chain, developed by Lockheed Martin, to assist in developing defense in depth strategies to combat the Advanced Persistent Threat. It maps controls to seven steps an attacker must go through to successfully execute a cyber attack.
  • {Download} Eight Emergency Preparedness Testing Scenarios: Engage your team and test your emergency preparedness with eight testing scenarios. Scenarios cover a variety of situations, including malware attack, unknown media,  physical security, power outage, ransomware attack, and website hack. 
  • {Download} 10 Essential Cybersecurity Best Practices: Cybersecurity threats continue to rapidly evolve in sophistication and are occurring with increased frequency to businesses of all shapes and sizes. Daily, we hear news about new data breaches, dangerous strains of malware, innovative hacking schemes, and targeted efforts of organized crime groups.  In fact, in today's cyber world no business is immune from cybersecurity threats.
  • {Download} Defense in Depth Checklist Controls: 50 Easy-to-Implement Controls to Strengthen Your Security
  • {Download} Password Tips: It’s important to create strong, complex passwords for your systems. That’s why we’ve put together these best methods for stronger passwords to help you train your employees. Keep in mind, though, that based on the risk of each system, these standards may fluctuate.
     

NCSAM Resources:


 

Protect IT.

Protect IT

Every click, share, send, and post you make creates a digital trail that can be exploited by cybercriminals. To protect yourself from becoming a cybercrime victim you must understand, secure, and maintain your digital profile.

 

 

SBS Resources - Protect Your Data:

  • {Blog} Safe Social Media Usage: We, as a society, use the internet, and especially social media, more with each day. We share everything, including travel itineraries, political views, and, sometimes, even what we had for lunch. However, we don’t often think about the consequences of the things we post on the internet. There are two primary ways to stay safe on social media: 1) security settings and 2) privacy settings.
    {Blog} FDIC Resource: A Community Bank Cyber Exercise - FDIC Directors Resource: A Community Bank Cyber Exercise: “Cyber Challenge: A Community Bank Cyber Exercise” is an FDIC resource designed to encourage institutions to discuss the potential threats and the impact of disruptions on common banking functions, especially as it relates to operational risk.
  • {Article} 50 Incident Response Preparedness Checklist Items: Have a plan for responding. Planning for a response is critical to reduce risks to your business, customers, and employees.
  • {Blog} Small Business Security 101: Protect your business - no matter how large or small. 
  • {Download} Investigating Phishing Emails: If your organization is notified that emails are being sent that appear to come from you or an employee of your organization, the following process can be useful in determining if the email is spoofed or if you have a compromised email account.
  • {Download} Microsoft Office 365 Security Suggestions: These suggestions are intended to provide ideas on improving the overall security of your instance of Microsoft Office 365. Some of these suggestions will also work on more traditional Microsoft Exchange Systems as well. 
  • {Download} 50+ Incident Response Preparedness Checklist Items: The #1 question organizations need to ask themselves is “if someone was in our network, would we be able to tell?” An organization’s ability to answer that single, extremely important question makes all the difference between being able to respond and recover from an incident quickly and cost-effectively vs. being notified by a user, or worse yet, by a federal agency, that something is amiss. Be honest with your answer; most organizations are unable to say “yes” to this question, and it rightfully keeps many information security professionals awake at night. If you are uncertain how to go about preparing for and detecting an incident on your network, you are not alone. This list contains over 50 items that should be prepared ahead of time.
     

NCSAM Resources:


 

Protect ITUpcoming Hacker Hour: Cybersecurity Awareness Round Table - Lessons from National Cybersecurity Awareness Month
Date: Wednesday, October 30, 2019 | 2:00 - 3:00 PM CT
Price: Free
Description: We would like to invite you to join SBS in celebrating National Cybersecurity Awareness Month with a security awareness round table. We will have an open discussion focused on building a stronger security culture for your entire organization - from your Board of Directors and employees to your customers. 

Join us as we share new cybersecurity awareness ideas and techniques that organizations have implemented to support their security culture.  An updated "Unique  Ideas to Create a Culture of Cybersecurity" download documenting the 2019 ideas will be shared following the webinar.

Register


Hacker Hour webinars are a series of free webinars hosted by SBS CyberSecurity. Unlike paid webinars, Hacker Hours are aimed to meet on a monthly basis to discuss cybersecurity issues and trends in an open format. Attendees are encouraged to join the conversation and get their questions answered. SBS will also offer products and services to help financial institutions with these specific issues.

Posted: Tuesday, October 1, 2019
Categories: Blog