COVID-19 Cybersecurity Challenges

Unfortunately, during this challenging time cyber criminals have been capitalizing on this global pandemic. These cybersecurity and remote working tips will help you keep your data secure. Topics include:
- Coronavirus themed phishing & hacking attacks
- What to look out for
- Teleworker tips
Cybersecurity Best Practices
This webinar includes discussions on major cybersecurity topics and ensure that you are aware of Cybersecurity Best Practices. Topics will include:
- What a Cyber Incident Means to You
- Cybersecurity Basic Concepts
- Cybersecurity Methodology
- Security vs. Compliance
- Components of a Successful Cybersecurity Program
Recorded on November 5, 2019
Phishing: More Sophisticated Than Ever

This webinar will teach you how to keep your organization and personal data more secure. We will be reviewing the social engineering around Phishing, Vishing and Smishing so you know what to look for and avoid.
- Common Phishing, Vishing and Smishing Techniques.
- How to identify Phishing emails.
- Tips on how to stay cyber secure.
Recorded on October 15, 2019
Exploring the Payment Card Security Standard: PCI-DSS

If your organization accepts, transmits, or stores any cardholder data then you are required to be PCI compliant. The main focus of these standards is to ensure that your customers’ data remains private and secure. This webinar will cover:
- How it got started.
- The major objectives of PCI-DSS.
- Best practices when handling card holder data.
- How to maintain compliance.
Recorded on September 17th, 2019
Penetration Testing

In this webinar we will be covering Penetration Testing and it’s place within your organization. You’ve probably heard of it before, but what is it exactly?
- External Penetration Testing
- Internal Penetration Testing
- The difference between a Vulnerability Assessment and a Penetration Test
- Common outcomes of a Penetration Test
- Why organizations should incorporate Penetration Testing into their security program
Recorded on August 20th, 2019
Cybersecurity for Manufacturers Including DFARS Compliance

This webinar will take you through two very different case studies, one in which cybersecurity was addressed, and the other in which it wasn’t. We’ll also discuss the top five risk factors in manufacturing as well as the new DFARS regulation facing military subcontractors. Whether you’re a military subcontractor or not, join us for some best practices around cybersecurity, specifically focused on manufacturing.
- Manufacturing-Specific Cybersecurity Case Studies
- Unique Manufacturing Risk Concerns
- Security vs. Compliance Mindset
- Getting Compliant with DFARS (for manufacturers with DoD contracts)
Recorded on July 23rd, 2019
Ransomware Relief

In this presentation, we’ll do a deep dive into what is ransomware, how does it get in, what motivates hackers, and how to avoid being a victim.
- What exactly is ransomware?
- How does it get in?
- What are the hacker's motivations?
- How can I protect against ransomware?
Recorded on June 18th, 2019
Why Your Cybersecurity Approach Matters

Getting hacked is just about guaranteed. But…You still have control over putting things in place to limit revenue loss, reputation damage, the spread of malware, and stolen data. Our agenda will include:
- What a Cyber Incident Means to You
- Cybersecurity Basic Concepts
- Cybersecurity Methodology
- Choosing a Cybersecurity Framework
- Security vs. Compliance
- Components of a Successful Cybersecurity Programs
Recorded on March 19th, 2019.
Creating Human Firewalls

Have you ever bought a used car? Do you remember being rushed, pressured, and made to feel like this was the best deal you could possibly get? Newsflash! This is exactly the way hackers are infiltrating networks across the globe. They’re preying on unsuspecting employees to open links in phishing emails. Our agenda will include:
- Humans are the weakest link in cybersecurity
- Used car salesman tactics (act now!, last car on the lot!)
- How to spot a phishing email
- SMShing
- The new text-based fraud trend
- Vishing: Phone-based phishing
Recorded on February 19th, 2019.
GDPR May Apply to You

The General Data Protection Regulation (GDPR) establishes strict global privacy requirements governing how you manage and protect personal data while respecting individual choice—no matter where data is sent, processed, or stored. You’d be surprised how many companies in the U.S. fall under GDPR requirements. You may be one of them.
- GDPR
- BasicsOverlaps with existing frameworks
- Key Provisions
- Security of Processing (Article 32)
- Getting started with GDPR compliance
Recorded on January 17th, 2019.