Innovation vs. protection. Striking the right balance between the two is the cornerstone of the modern IT world. This series will provide the tools needed to foster innovation, address threats, and maintain privacy in today’s rapidly changing digital landscape.
Purchase Webinars Individually or Purchase the Series to Save 10%!
Financial institutions rely heavily on IT professionals to keep their myriad internal systems up-to-date and implement new technologies for employees and accountholders. Regardless of how technology is structured and deployed, financial institutions remain a prime target for data breaches, cyber-attacks, fraud, and scams from unseen criminals. Regulators continue to focus on cybersecurity in the wake of numerous, highly publicized data breaches. Now, more than ever, it is crucial that IT professionals obtain current, relevant, and ongoing training to protect data integrity and functionality. Ensure your IT strategy strikes the right balance with this series.
- Layered Cybersecurity: Finding the Best Strategy for Your Credit Union
- Cybersecurity Assessment Tool 2.0 & GLBA Privacy
- GLBA Security Expectations, Internal Controls & the Human Factor
- Building & Sustaining a Cyber Intelligence Unit (CIU)
Session Dates & Descriptions
Click on presenters’ names below for more information.
August 12, 2020
Layered Cybersecurity: Finding the Best Strategy for Your Credit Union
Brandon Harms, Infogressive, Inc.
It’s no secret that the financial industry is a prime target for cyberattacks. You control vital information that the bad guys want and are willing to expend the necessary time and resources to get. To defend against such attacks, your cybersecurity strategy needs to include a layered approach for prevention and detection. This webinar will explain who your adversaries are and what security services you should have in place to secure your organization. Don’t be an easy target.
September 10, 2020
Cybersecurity Assessment Tool 2.0 & GLBA Privacy
Randall J. Romes and John Moeller, CLA
This webinar will be an introduction to the FFIEC’s Cybersecurity Assessment Tool (CAT) and delve into its history and the evolution, including the change from a binary approach (i.e., control exists or does not exist) to the current assessment of cybersecurity readiness measurement. This introductory webinar will provide an overview of GLBA compliance and application of the CAT tool/process for measuring, tracking, and reporting compliance.
October 15, 2020
GLBA Security Expectations, Internal Controls & the Human Factor
John Moeller, CLA
Take a deep dive into GLBA expectations and learn how to apply the FFIEC’s Cybersecurity Assessment Tool (CAT) and process to address those expectations. You’ll learn best practice internal controls that are tied back to GLBA expectations for running a safe and sound cybersecurity operation. Case studies highlighting the “human factor” in the security chain will be emphasized to demonstrate where risky exceptions can arise. This webinar will also address the threats of targeted attacks and phishing/vishing. Examples of publicized breaches and spear-phishing will be examined, such as the compromise of John Podesta’s email from “Gmail” advising he must change his password for security reasons.
October 29, 2020
Building & Sustaining a Cyber Intelligence Unit (CIU)
John Moeller, David Anderson, and Christian Maneske, CLA
This advanced webinar will explore the strategy and structure of mature cybersecurity operations within financial institutions. It will leverage the concept of a Financial Intelligence Unit (FIU) from the BSA/fraud spaces as the beginnings of an example for a Cyber Intelligence Unit (CIU).
Take this opportunity to explore examples of mature cybersecurity operations; how these operations leverage internal and external resources for threat intelligence, such as FS-ISAC and InfraGard; how to effectively collaborate and share threat intelligence; and how to perform Red Team/Blue Team/Purple Team activities and “threat hunting” exercises to further improve your cybersecurity profile and operations.