[expert tips at your fingertips]


2017 will go down as the year that cybersecurity went mainstream. Every week there was a new announcement about businesses being affected by ransomware, phishing, intrusions and other attacks.

Let's make 2018 the year that we stop putting off important cybersecurity measures; it will be one resolution you're happy to keep.


The New York State Department of Financial Services (DFS) recently proposed a cybersecurity program for regulated organizations including banks and insurance companies. This requires regulated entities to establish and maintain a cybersecurity program to protect consumer information.


GreyCastle Security will explore the hidden risks and the response planning tactics that will help ensure your organization isn’t the next victim of cybercrime.


Ransomware has been around for years, however, CryptoLocker attacks have risen sharply in recent months leaving organizations exposed and contemplating paying for their data.


GreyCastle Security will provide much-needed information and a no-nonsense guide on ISO 27001:2013 certification.

Learn how you can build an efficient, cost-effective and meaningful cybersecurity program.


When it comes to your health, preventative care is always the better option. Even though you can’t know when a heart attack or stroke will strike, there are many different things you can do to lower your risk.

It's the same concept with cybersecurity. Preventative measures will lower the probability of a breach. If ignored, the result can deeply impact your organization's reputation and finances.


GreyCastle Security will cover the standards for risk assessment that work for almost all regulatory and compliance requirements.


Being able to respond efficiently and effectively to ransomware can make the difference between survival or getting chewed up and spit back out.

Although ransomware typically targets only targets a single user, attackers are learning different distribution and infection methods that can take your organization down for days, weeks, or potentially months.


Attorney F. Paul Greene and GreyCastle Security Security Strategist and Practice Lead Candice Wold will guide attendees on developing a realistic approach to the timeline as well as identify how current requirements from standards such as ISO 27001:2013 and Privacy Shield may affect your organization’s adherence to GDPR.


Your people are your first line of defense against cyberattacks – but do they know that?

In this session, you'll learn how to develop a cybersecurity awareness training program, how to get buy-in from executives and management, and how to reinforce cybersecurity training with employees.


While the cloud offers very real and measurable benefits, it also requires new thinking about the associated cybersecurity risks.

This session will provide recent real-world experiences with cloud providers and discuss important considerations for utilizing this new architecture. Case studies will be presented, and attendees will walk away with actionable advice for managing risk in their cloud(s).


You're storing and transmitting everything from educational records and medical records to PII and credit card data.

Let's face it - your organization is a big target.

There are threats from external attackers, malicious insiders, unaware and apathetic employees - and you want to understand how prepared you are. But not all pen tests are created equal.


If you are among the 60-75% of organizations that have been recently surveyed and are not in compliance with GDPR, you are probably facing a bevy of concerns.

GreyCastle Security’s Senior Security Specialist, Sarah Cushard, will help you respond to privacy requests and take the quickest path toward realistic GDPR compliance.


Based on recent high profile breaches, hackers have learned that contractors and other third-party providers can provide an opening into otherwise-secured corporate networks.

You’ve spent time, money and energy securing your organization internally, only to have the back door wide open.


Studies show that there are nearly 500,000 open cybersecurity positions in the United States, a 5,000% increase from 2010.

By "virtualizing" your cybersecurity function, you can expand your existing team with experts, when you need them. All for the price of a single cybersecurity resource.

Join GreyCastle Security as we introduce the next-generation concept of cybersecurity program "virtualization" and the benefits that it offers.


Unfortunately, when it comes to ISO 27001 certification, timelines for compliance can be truncated by external deadlines from third parties.

In this webinar, GreyCastle Security will help you learn how to respond to, or see, the quickest path toward ISO 27001 certification.


Cybersecurity exists for one reason: to protect the (assets of your) organization. Period.

This is your chance to learn about the simplest solution you’ve never seen. Join GreyCastle Security to understand how to get back to the basics and make cybersecurity a tool that everyone in the company understands, trusts and relies on to effectively manage risk.


It's essential to make your employees aware of the latest threats and cybersecurity best practices for protecting themselves and your business. However, awareness is not a "one and done" event; it is a continuous process of learning and adjusting.

In this webinar, you'll learn how to develop a cybersecurity awareness training program, how to get buy-in from executives and management, and how to reinforce cybersecurity training with employees.


Does the upcoming GLBA audit have your institution in a panic?

This is the perfect time to verify that you meet all the requirements. Would your risk assessment make the grade? What about your training program? What type of evaluation of your third-party service providers do you need and how should you document it?

The GLBA Safeguards Rule covers all of these items.


Money is missing, malware is exploding and the clock is ticking. In the new cyber environment, you're either failing to plan or planning to fail. This webinar will focus on one of the most critical elements in any Incident Response process - the Incident Response Go Bag.

Join GreyCastle Security as we journey into the heart of the first response and the tools and techniques that all responders should have ready to go.


Don't build a $100 fence around a $10 horse.

Data classification is the process of inventorying, labeling and defining handling requirements for assets according to their importance and sensitivity, yet it is as much art as it is science.

Join GreyCastle Security as we explore the barriers to classification, demystify the process and demonstrate how classification can save your organization time, money and energy.


2019, like years past, has been one of exuberant ups and catastrophic downs. Cybersecurity is still a fledgling industry with a penchant for entropy and a flair for hype. And an endless supply of radically disparate statistics from all corners of the industry proves only one thing - we're still in survival mode.

So what will our biggest challenges be 2019?


GLBA compliance is not a new concept.

Would your risk assessment make the grade? Do you need to prepare for GLBA audits?

Join GreyCastle Security's Vice President of Services to learn about why the risk assessment process must be run by the business.


Incident Response and Digital Forensics, for the most part, have differing phases, objectives, and goals.

However, they need to complement each other to not only provide answers but to also give insight in preventing reoccurrence of the security incident.

Senior Security Specialist, Adam Dean, walks attendees through how they work together during a security incident.


GreyCastle Security identifies and demystifies seven of the top misconceptions about cybersecurity.

Join GreyCastle Security's Cybersecurity Solution Advisor Paul Robinson and Direction of Business Intelligence Sean Phillips as they guide attendees on how GreyCastle Security defines industry standards.


Join GreyCastle Security to understand how to get back to the basics and make cybersecurity a tool that everyone in the company understands, trusts and relies on to effectively manage risk.

Listen to GreyCastle Security's Vice President of Services speak on the six key steps to building your own Next-Gen Cybersecurity Program.


ISO 27001 can be frustrating and the clausal information can be very non-prescriptive.

Wil Seiler, Director of Product Management at GreyCastle Security, breaks down how ISO 27001 compliance can help your bottom line.


Utilizing a framework can help your higher education institution address common business risk concerns.

Senior Security Specialist, Barry Hofecker takes attendees through the benefits of having the NIST 800-171 framework as the foundation of your cybersecurity program.


Join F. Paul Greene, Partner at Harter Secrest & Emery, and Dan Didier, Vice President of Services at GreyCastle Security, for a timely update to get real-world insight on a new attack surface that is subject to exploit: student, applicant, and alumni data maintained on SaaS platforms.


Cybersecurity is not just an "IT" issue – it affects the overall health of your business. But does your current budget reflect that? You need a supporting cybersecurity budget that allows you to address common business concerns.

Join Paul Robinson, Cybersecurity Solutions Advisor, as he identifies what it really means to have a purposefully cybersecurity budget.


In this webinar, Dr. Bertine Colombo McKenna, FACHE, Executive Healthcare Advisor for GreyCastle Security and former Healthcare Executive, will examine the Task Group’s newest report and how healthcare organizations can obtain positive outcomes through information security.

Brian Didier, Security Specialist at GreyCastle Security, will join Dr. McKenna to break down the most common cybersecurity threats healthcare providers face today and how to avoid them.


One of the biggest factors when choosing a vendor or strategic partner is their cybersecurity program.

Join GreyCastle Security as we demystify obtaining a clean SOC 2 Type 2 Report which will lead to measurable ROI through your cybersecurity investments.


Imagine this scenario: your computer has been infected with malicious software that has stolen your credit card and banking information – and now it is actively spreading across your network, infecting every system that it can access.


Derek Loonan, Senior Security specialist, demystifies risk management 101 and provide attendees with practical tactics focused on risk mitigation, a simple eight-step process for managing risk and effective methods for complying with HIPAA, HITECH and healthcare security standards.


You need an awareness program designed for long-term results. Runners don’t wake up one day and say, "I'm going to run a marathon." Your cybersecurity awareness program is going to require the same drive and dedication.

Join Brian Murphy, Security Specialist at GreyCastle Security, as he shares the tips, tricks, and best practices we use to transform corporate citizens into cybersecurity Olympians.