ON-DEMAND WEBINARS

[expert tips at your fingertips]

NEW YEAR'S RESOLUTIONS - WHAT TO DO AND HOW TO STICK TO THEM

2017 will go down as the year that cybersecurity went mainstream. Every week there was a new announcement about businesses being affected by ransomware, phishing, intrusions and other attacks.

Let's make 2018 the year that we stop putting off important cybersecurity measures; it will be one resolution you're happy to keep.

DFS REGULATIONS - NO NEED TO REINVENT THE WHEEL

The New York State Department of Financial Services (DFS) recently proposed a cybersecurity program for regulated organizations including banks and insurance companies. This requires regulated entities to establish and maintain a cybersecurity program to protect consumer information.

COUNTDOWN TO GDPR COMPLIANCE: TAKING THE DEAD OUT OF DEADLINE

GreyCastle Security will explore the hidden risks and the response planning tactics that will help ensure your organization isn’t the next victim of cybercrime.

CRYPTOLOCKER: SURVIVING A RANSOMWARE ATTACK

Ransomware has been around for years, however, CryptoLocker attacks have risen sharply in recent months leaving organizations exposed and contemplating paying for their data.

ISO 27-WHA?: THE TOP TEN THINGS YOU NEED TO KNOW ABOUT ISO 27001

GreyCastle Security will provide much-needed information and a no-nonsense guide on ISO 27001:2013 certification.

Learn how you can build an efficient, cost-effective and meaningful cybersecurity program.

PAIN BY NUMBERS: THE REAL COST OF CYBER(IN)SECURITY

When it comes to your health, preventative care is always the better option. Even though you can’t know when a heart attack or stroke will strike, there are many different things you can do to lower your risk.

It's the same concept with cybersecurity. Preventative measures will lower the probability of a breach. If ignored, the result can deeply impact your organization's reputation and finances.

DOS AND DON'TS: PERFORMING EFFECTIVE RISK MANAGEMENT

GreyCastle Security will cover the standards for risk assessment that work for almost all regulatory and compliance requirements.

ULTIMATE SURVIVAL: RANSOMWARE

Being able to respond efficiently and effectively to ransomware can make the difference between survival or getting chewed up and spit back out.

Although ransomware typically targets only targets a single user, attackers are learning different distribution and infection methods that can take your organization down for days, weeks, or potentially months.

BREAKING BARRIERS: TOP 10 THINGS YOU NEED TO KNOW ABOUT GDPR

Attorney F. Paul Greene and GreyCastle Security Security Strategist and Practice Lead Candice Wold will guide attendees on developing a realistic approach to the timeline as well as identify how current requirements from standards such as ISO 27001:2013 and Privacy Shield may affect your organization’s adherence to GDPR.

PUTTING THE "AWARE" BACK IN AWARENESS: 5 TIPS FOR HAVING AN EFFECTIVE AWARENESS PROGRAM

Your people are your first line of defense against cyberattacks – but do they know that?

In this session, you'll learn how to develop a cybersecurity awareness training program, how to get buy-in from executives and management, and how to reinforce cybersecurity training with employees.

THUNDERSTORM OR SILVER LININGS: SECURING YOUR CLOUD

While the cloud offers very real and measurable benefits, it also requires new thinking about the associated cybersecurity risks.

This session will provide recent real-world experiences with cloud providers and discuss important considerations for utilizing this new architecture. Case studies will be presented, and attendees will walk away with actionable advice for managing risk in their cloud(s).

HACKERS, LEAKS & LOSERS: HOW TO NOT FAIL AT PEN TESTING

You're storing and transmitting everything from educational records and medical records to PII and credit card data.

Let's face it - your organization is a big target.

There are threats from external attackers, malicious insiders, unaware and apathetic employees - and you want to understand how prepared you are. But not all pen tests are created equal.

GDPR: MISSED THE MARK. MISSED THE DEADLINE.

If you are among the 60-75% of organizations that have been recently surveyed and are not in compliance with GDPR, you are probably facing a bevy of concerns.

GreyCastle Security’s Senior Security Specialist, Sarah Cushard, will help you respond to privacy requests and take the quickest path toward realistic GDPR compliance.

VENDOR RISK: THE BACK DOOR YOU CAN'T LEAVE UNLOCKED

Based on recent high profile breaches, hackers have learned that contractors and other third-party providers can provide an opening into otherwise-secured corporate networks.

You’ve spent time, money and energy securing your organization internally, only to have the back door wide open.

NEXT-GENERATION OUTSOURCING: VIRTUALIZATION YOUR CYBERSECURITY FUNCTION

Studies show that there are nearly 500,000 open cybersecurity positions in the United States, a 5,000% increase from 2010.

By "virtualizing" your cybersecurity function, you can expand your existing team with experts, when you need them. All for the price of a single cybersecurity resource.

Join GreyCastle Security as we introduce the next-generation concept of cybersecurity program "virtualization" and the benefits that it offers.

OVERWORKED & UNDERDONE: ISO 27001 COMPLIANCE BY 2019

Unfortunately, when it comes to ISO 27001 certification, timelines for compliance can be truncated by external deadlines from third parties.

In this webinar, GreyCastle Security will help you learn how to respond to, or see, the quickest path toward ISO 27001 certification.

PUTTING THE "PRO" IN PROACTIVE: BUILDING A NEXT-GEN CYBERSECURITY PROGRAM

Cybersecurity exists for one reason: to protect the (assets of your) organization. Period.

This is your chance to learn about the simplest solution you’ve never seen. Join GreyCastle Security to understand how to get back to the basics and make cybersecurity a tool that everyone in the company understands, trusts and relies on to effectively manage risk.

PUTTING THE "AWARE" BACK IN AWARENESS: 5 TIPS TO HAVING AN EFFECTIVE AWARENESS PROGRAM

It's essential to make your employees aware of the latest threats and cybersecurity best practices for protecting themselves and your business. However, awareness is not a "one and done" event; it is a continuous process of learning and adjusting.

In this webinar, you'll learn how to develop a cybersecurity awareness training program, how to get buy-in from executives and management, and how to reinforce cybersecurity training with employees.

BIG MAN(DATE) ON CAMPUS: WHAT GLBA MEANS FOR HIGHER EDUCATION

Does the upcoming GLBA audit have your institution in a panic?

This is the perfect time to verify that you meet all the requirements. Would your risk assessment make the grade? What about your training program? What type of evaluation of your third-party service providers do you need and how should you document it?

The GLBA Safeguards Rule covers all of these items.

A PREPPER'S GUIDE TO THE INCIDENT RESPONSE GO-BAG

Money is missing, malware is exploding and the clock is ticking. In the new cyber environment, you're either failing to plan or planning to fail. This webinar will focus on one of the most critical elements in any Incident Response process - the Incident Response Go Bag.

Join GreyCastle Security as we journey into the heart of the first response and the tools and techniques that all responders should have ready to go.