Events

Page: 1 2 3

Calculating the Cost of a Data Breach Today

Click here to register.

To obtain approval and funding for security improvements, technologists often have to make their case by pointing to losses from recent security breaches. But, calculating those losses can be tricky.

Join Brent Hobby, TraceSecurity IT GRC Subject Matter Specialist, for an educational and interactive webinar. Hobby has scoured the most recent statistics and studies to help you best estimate the direct and indirect costs of a data breach and justify your 2015 budget request. In addition, Hobby will provide an update on the most common causes of a data breach and discuss typical risks that your organization may be overlooking.

Click here to register.

Protecting Your Credit Union Against Cyber Attacks - Watch On-Demand Now

Click here to watch.

Cyber liability exposures continue to rise, and has drawn the attention of NCUA examiners. In fact, the NCUA Region II office has said that IT Security will be a top concern in the examination process going forward. IT security now requires solid governance and oversight with active participation by management and the board of directors. 
 
A Verizon 2014 Data Breach Investigation Report, revealed that 1,367 data breaches occurred in 2013, with 465 involving the finance industry. Within the financial sector, the most common security breach incidents involved Web application attacks, denial of services (DDoS) attacks, payment card skimming and insider misuse, according a Verizon study. While financial gain motivates most data breach perpetrators, cyber espionage is also increasing CUNA Mutual reports.

Click here to watch.

Best Practices to Simplify Your Information Security and Compliance Program - Watch On-Demand Now

Click here to watch.

Data protection is increasingly complex, time-consuming and expensive, and the regulatory landscape is in a state of constant change. Many organizations struggle to deal with not only the challenges of implementation but the overwhelming volume of advice being offered.
 
In this webinar, we will tone down the rhetoric and explore tips and best practices that improve both your internal information security and compliance program and your business. Join Brent Hobby, TraceSecurity’s GRC Subject Matter Specialist, for an educational and informative webinar to learn how proper risk management, compliance and audit principles enable you to be proactive and seamlessly evolve to a changing regulatory and data protection landscape. Brent has worked in IT for more than 25 years and in information security for the past 14 years with positions ranging from Software Engineer to Director of Risk Management.
 
Attendees will explore:
  • What it really means to be compliant
  • Why compliance management continues to burden organizations and how they can best streamline and simplify internal operations to address them
  • What role a continuous internal risk management process plays within an organization’s holistic information security and compliance program

Click here to watch.

Security is for Suckers - Watch On-Demand Now

Click here to watch.

In this session Jim Stickley discusses how organizations are facing a new type of cyber threat. He takes a step back to discuss the evolution of cyber attacks and what led to the Target breach. Then, you will learn how these past attacks are driving criminals today in a new direction that will eventually lead to the complete and total failure of the social security identification system. During this session, attendees will see firsthand how vulnerable general businesses, including financial institutions, are to the future of cyber attacks. Of course Stickley will also discuss what your organization can and should be doing to prepare for future attacks and how your employees can avoid being the next cyber breach news story.

Click here to watch.

Mapping Information Security Risk to Compliance - Watch On-Demand Now

Click here to watch.

Examiners and regulatory auditors are checking to see whether cyber security threats are properly managed. Recent guidance from federal regulators makes it clear that even the smallest organizations are significant targets for fraudulent activity.

In this webinar, Gerald Beasley, TraceSecurity Security Services Manager and information security expert, will present a tactical outline that ensures your IT security risk management activities are properly aligned with federal guidelines and significant risk scenarios are not missed. You will:

  • Gain insight into the role that even small or medium-sized businesses play in the national infrastructure, and why the federal government is emphasizing this aspect of information security
  • Learn how to ensure that strategic risk management practices are properly connected to the ground-level implementation of IT systems
  • Become aware of specific threat vectors that are important to consider in the current environment

Click here to watch.

Page: 1 2 3