Skip to main content

Resources

{Webinar} Spring Happenings at the SBS Institute

Wednesday, April 24, 2019

{Webinar} Spring Happenings at the SBS Institute

Spring cleaning is on everyone’s “To Do” list right now.  Remember, it’s also a great time to dust off your cybersecurity knowledge and learn the latest. Join us for a free educational webinar that will feature our online cybersecurity certification courses.

Read More...

Categories: Blog, Webinar

Technology Service Provider Contracts (FIL-19-2019)

Friday, April 5, 2019

Technology Service Provider Contracts (FIL-19-2019)

You might think you have vendor management and business continuity figured out, but don’t be so sure. The FDIC’s FIL-19-2019 highlights observations from recent examinations revealing that financial institutions may be unaware of the gaps that often exist between a technology service provider's cont...

Read More...

Categories: Blog

SOC 2 vs. SOC for Cybersecurity Reports

Wednesday, March 27, 2019

SOC 2 vs. SOC for Cybersecurity Reports

There are a variety of different types of SOC reports, including SOC 1, SOC 2, and SOC 3, as well as the newest member of the team – the SOC for Cybersecurity. While each report has its own purpose, we’re going to dive into the difference between the SOC 2 and SOC for Cybersecurity reports.

Read More...

Categories: Blog

FTC Proposes Changes to GLBA Safeguards Rule

Friday, March 22, 2019

FTC Proposes Changes to GLBA Safeguards Rule

The first major changes to the GLBA and the Safeguards Rule have been proposed. On March 5th, 2019, the FTC announced proposed revisions to the Safeguards Rule, including an expansion of the companies covered by the Rule and requiring specific controls to secure customers’ information.

Read More...

Categories: Blog, In the News

Scoping Your IT Audit Based on Risk

Wednesday, March 20, 2019

Scoping Your IT Audit Based on Risk

"Scoping your IT Audit based on risk" is a phrase that’s thrown around a lot by IT Audit companies and examiners, but what does it really mean? How do you know if your IT Audit is truly risk-based, or if it’s based on an auditor’s idea of what security ought to be?

Read More...

Categories: Blog

A Guide to Performing Internal Social Engineering Testing

Wednesday, March 13, 2019

A Guide to Performing Internal Social Engineering Testing

Social engineering testing more than once a year is proven to be a beneficial way to keep employees alert and hold them responsible for their actions. Since hiring regular testing throughout the year is not an option for everyone, let’s go through some options for performing your own internal social...

Read More...

Categories: Blog

{Download} Eight Emergency Preparedness Testing Scenarios

Thursday, February 28, 2019

{Download} Eight Emergency Preparedness Testing Scenarios

Engage your team and test your emergency preparedness with eight testing scenarios. Scenarios cover a variety of situations, including malware attack, unknown media,  physical security, power outage, ransomware attack, and website hack.  Each scenario includes:   - Ground Rul...

Read More...

Categories: Blog

{Cyber Byte} Penetration Testing

Friday, February 22, 2019

{Cyber Byte} Penetration Testing

This CyberByte video will crack the code on the Penetration Test. Learn how to properly scope a test, the penetration test process, how to choose the right test, and variations in testing.

Read More...

Categories: Blog, Videos

Sheltered Harbor: A Safe Haven from the Perfect Storm

Wednesday, February 6, 2019

Sheltered Harbor: A Safe Haven from the Perfect Storm

Sheltered Harbor is a relatively new concept that is being realized today to address new and existing cybersecurity threats that could affect the financial sector on a massive scale. The idea is to create extremely secure (and segmented) backups of financial data across the financial sector with the...

Read More...

Categories: Blog
Page 10 of 24First   Previous   5  6  7  8  9  [10]  11  12  13  14  Next   Last