Hacker Hour

Results 1-10 of 32
Hacker Hour: Suspicious Activity Reports - Reporting Cyber Events

Hacker Hour: Suspicious Activity Reports - Reporting Cyber Events

Recorded on November 22, 2024 | 1 CPE

Financial institutions face several challenges when completing Suspicious Activity Reports (SARs) for cyber events. Join us for a step-by-step guide on how to fill out SARs, addressing common issues such as identifying suspicious activities, ensuring accuracy, and meeting regulatory deadlines.We will also explore key compliance obligations and highlight the essential role that IT plays in detecting, reporting, and mitigating cyber events, emphasizing the importance of effective collaboration between compliance and IT teams.This webinar is ideal for compliance officers, IT professionals, risk management teams, and anyone involved in cybersecurity and regulatory compliance.

Hacker Hour: Leveraging Artificial Intelligence

Hacker Hour: Leveraging Artificial Intelligence

Recorded on October 30, 2024 | 1 CPE

Join us as we dive into the exciting world of AI! We'll chat about potential challenges and share some simple, friendly tips for using AI responsibly. We can't wait to explore this together!

Hacker Hour: The Cybersecurity Culture Checklist

Hacker Hour: The Cybersecurity Culture Checklist

Recorded on September 26, 2024 | 1 CPE

Join us and walk through a cybersecurity culture checklist to help you measure and improve your organizations cybersecurity culture. Well explore key strategies for embedding these practices into your business, moving you closer to a cyber-savvy culture.

Hacker Hour: Unveiling the Most Common Findings in Penetration Testing

Hacker Hour: Unveiling the Most Common Findings in Penetration Testing

Recorded on August 28, 2024 | 1 CPE

Join us for an insightful webinar where we delve into the most common findings in penetration testing and offer proactive solutions to fortify your network before your next penetration test.

Hacker Hour: Harnessing the Value of Data Flow Diagrams

Hacker Hour: Harnessing the Value of Data Flow Diagrams

Recorded on July 24, 2024 | 1 CPE

We discuss essential inputs and outputs of a good data flow diagram and work our way through the challenges of creating and interpreting them. We analyze some real-life examples to ensure you have a solid foundation to enhance your data flow diagrams.

Hacker Hour: Understanding Data Brokers and Protecting Privacy

Hacker Hour: Understanding Data Brokers and Protecting Privacy

Recorded on June 18, 2024 | 1 CPE

Join us for a compelling session with Chris Wingfield, the esteemed Managing Director of Cyber Threat Intelligence at 360 Privacy. Well delve into strategies for diminishing your cybersecurity risks by minimizing your digital footprint. Discover how to safeguard your privacy and fortify your defenses in the digital realm.

Hacker Hour: Quantum Computing 101

Hacker Hour: Quantum Computing 101

Recorded on May 29, 2024 | 1 CPE

Join us for an overview of quantum computing, its potential applications in the financial sector, and how organizations can assess the benefits and risks of this technology.

Hacker Hour: Strengthening Cybersecurity in Business Banking Customers

Hacker Hour: Strengthening Cybersecurity in Business Banking Customers

Recorded on April 30, 2024 | 1 CPE

Explore the latest in cybersecurity education and risk management techniques, which can help create a stronger security mindset among business customers.

Hacker Hour: Advancing Your Penetration Testing Program

Hacker Hour: Advancing Your Penetration Testing Program

Recorded on March 28, 2024 | 1 CPE

Discuss the various industry recommendations and the process of starting and maturing a penetration testing program.

Hacker Hour: Documents to Review a Critical Vendor

Hacker Hour: Documents to Review a Critical Vendor

Recorded on February 29, 2024 | 1 CPE

Delve into the importance of vendor management governance, vendor selection, and vendor risk assessment. We will guide you through the key documents that you need to assess when working with a critical vendor. Dont miss this opportunity to learn from industry experts and enhance your vendor management program.