COVID-19 Cybersecurity Challenges

COVID19 Cybersecurity Webinar

Unfortunately, during this challenging time cyber criminals have been capitalizing on this global pandemic. These cybersecurity and remote working tips will help you keep your data secure. Topics include:

  • Coronavirus themed phishing & hacking attacks
  • What to look out for
  • Teleworker tips

Cybersecurity Best Practices

 

 

 

 

 

 

 

 

 

This webinar includes discussions on major cybersecurity topics and ensure that you are aware of Cybersecurity Best Practices. Topics will include:

  • What a Cyber Incident Means to You
  • Cybersecurity Basic Concepts
  • Cybersecurity Methodology
  • Security vs. Compliance
  • Components of a Successful Cybersecurity Program

Recorded on November 5, 2019

Phishing: More Sophisticated Than Ever

Phishing Oct 19

This webinar will teach you how to keep your organization and personal data more secure. We will be reviewing the social engineering around Phishing, Vishing and Smishing so you know what to look for and avoid.

  • Common Phishing, Vishing and Smishing Techniques.
  • How to identify Phishing emails.
  • Tips on how to stay cyber secure.

Recorded on October 15, 2019

Exploring the Payment Card Security Standard: PCI-DSS

Editor

If your organization accepts, transmits, or stores any cardholder data then you are required to be PCI compliant. The main focus of these standards is to ensure that your customers’ data remains private and secure. This webinar will cover:

  • How it got started.
  • The major objectives of PCI-DSS.
  • Best practices when handling card holder data.
  • How to maintain compliance.

Recorded on September 17th, 2019

Penetration Testing

Pen Testing August 19

 

In this webinar we will be covering Penetration Testing and it’s place within your organization. You’ve probably heard of it before, but what is it exactly?

  • External Penetration Testing
  • Internal Penetration Testing
  • The difference between a Vulnerability Assessment and a Penetration Test
  • Common outcomes of a Penetration Test
  • Why organizations should incorporate Penetration Testing into their security program

Recorded on August 20th, 2019

Cybersecurity for Manufacturers Including DFARS Compliance

Cybersecurity for Manufacturers July 19

This webinar will take you through two very different case studies, one in which cybersecurity was addressed, and the other in which it wasn’t.  We’ll also discuss the top five risk factors in manufacturing as well as the new DFARS regulation facing military subcontractors.  Whether you’re a military subcontractor or not, join us for some best practices around cybersecurity, specifically focused on manufacturing.

  • Manufacturing-Specific Cybersecurity Case Studies
  • Unique Manufacturing Risk Concerns
  • Security vs. Compliance Mindset
  • Getting Compliant with DFARS (for manufacturers with DoD contracts)

Recorded on July 23rd, 2019



Ransomware Relief

Ransomware Relief June 19

In this presentation, we’ll do a deep dive into what is ransomware, how does it get in, what motivates hackers, and how to avoid being a victim.

  • What exactly is ransomware?
  • How does it get in?
  • What are the hacker's motivations?
  • How can I protect against ransomware?

Recorded on June 18th, 2019

 

Why Your Cybersecurity Approach Matters

 

Cybersecurity Approach March 19-2

Getting hacked is just about guaranteed.  But…You still have control over putting things in place to limit revenue loss, reputation damage, the spread of malware, and stolen data. Our agenda will include:

  • What a Cyber Incident Means to You
  • Cybersecurity Basic Concepts
  • Cybersecurity Methodology
  • Choosing a Cybersecurity Framework
  • Security vs. Compliance
  • Components of a Successful Cybersecurity Programs

Recorded on March 19th, 2019.

Creating Human Firewalls

Social Engineering Feb 19-1

Have you ever bought a used car? Do you remember being rushed, pressured, and made to feel like this was the best deal you could possibly get?  Newsflash!  This is exactly the way hackers are infiltrating networks across the globe. They’re preying on unsuspecting employees to open links in phishing emails. Our agenda will include:

  • Humans are the weakest link in cybersecurity
  • Used car salesman tactics (act now!, last car on the lot!)
  • How to spot a phishing email
  • SMShing
  • The new text-based fraud trend
  • Vishing: Phone-based phishing

 

Recorded on February 19th, 2019.


 

GDPR May Apply to You

GDPR Webinar Jan 19

The General Data Protection Regulation (GDPR) establishes strict global privacy requirements governing how you manage and protect personal data while respecting individual choice—no matter where data is sent, processed, or stored. You’d be surprised how many companies in the U.S. fall under GDPR requirements. You may be one of them.

  • GDPR
  • BasicsOverlaps with existing frameworks
  • Key Provisions
  • Security of Processing (Article 32)
  • Getting started with GDPR compliance

 

Recorded on January 17th, 2019.