BEGIN:VCALENDAR VERSION:2.0 METHOD:PUBLISH PRODID:-//Telerik Inc.//Sitefinity CMS 13.3//EN BEGIN:VTIMEZONE TZID:Central Standard Time BEGIN:STANDARD DTSTART:20231102T020000 RRULE:FREQ=YEARLY;BYDAY=1SU;BYHOUR=2;BYMINUTE=0;BYMONTH=11 TZNAME:Central Standard Time TZOFFSETFROM:-0500 TZOFFSETTO:-0600 END:STANDARD BEGIN:DAYLIGHT DTSTART:20230301T020000 RRULE:FREQ=YEARLY;BYDAY=2SU;BYHOUR=2;BYMINUTE=0;BYMONTH=3 TZNAME:Central Daylight Time TZOFFSETFROM:-0600 TZOFFSETTO:-0500 END:DAYLIGHT END:VTIMEZONE BEGIN:VEVENT DESCRIPTION:Humans\, also known as staff\, are often the weak link in the c ybersecurity chain. This webinar will identify effective controls and best practices to guard against the &ldquo\;human factor.&rdquo\; \; It wi ll also teach you how to apply the FFIEC&rsquo\;s Cybersecurity Assessment Tool (CAT)\, why a GLBA risk assessment is needed\, and where risk can ar ise. \; \;\n\nLearning Objectives\n\n Effectively use the FFIEC &rsquo\;s Cybersecurity Assessment Tool (CAT) to drive cyber risk control adoption\n Identify and implement effective controls against the human factor\n Define the need for GLBA risk assessment\n Explain and just ify controls to reduce email phishing\n List 10 &ldquo\;best practice&r dquo\; IT controls for financial institutions\n\nTake a deep dive into GLB A expectations and learn how to apply the FFIEC&rsquo\;s Cybersecurity Ass essment Tool (CAT) and process to address those expectations. \; You&r squo\;ll learn best practice internal controls that are tied back to GLBA expectations for running a safe and sound cybersecurity operation. Case st udies highlighting the human factor in the security chain will be emphasiz ed to demonstrate where risky exceptions can arise. This webinar will also address the threats of targeted attacks and phishing/vishing. Examples of publicized breaches and spear-phishing will be examined\, such as the com promise of John Podesta&rsquo\;s email from &ldquo\;Gmail&rdquo\; advising he must change his password for security reasons. DTEND:20201015T203000Z DTSTAMP:20240328T121850Z DTSTART:20201015T190000Z LOCATION: SEQUENCE:0 SUMMARY:GLBA Security Expectations\, Internal Controls & the Human Factor UID:RFCALITEM638472071309210043 X-ALT-DESC;FMTTYPE=text/html:
Humans\, also known as staff\, are often th
e weak link in the cybersecurity chain. This webinar will identify effecti
ve controls and best practices to guard against the &ldquo\;human factor.&
rdquo\; \; It will also teach you how to apply the FFIEC&rsquo\;s Cybe
rsecurity Assessment Tool (CAT)\, why a GLBA risk assessment is needed\, a
nd where risk can arise. \; \;
\n
\nLearning Objectives<
/p>\n
Take a deep dive into GLBA expectations and learn how to apply the FFIEC&rsquo\; s Cybersecurity Assessment Tool (CAT) and process to address those expecta tions. \; You&rsquo\;ll learn best practice internal controls that are tied back to GLBA expectations for running a safe and sound cybersecurity operation. Case studies highlighting the human factor in the security cha in will be emphasized to demonstrate where risky exceptions can arise. Thi s webinar will also address the threats of targeted attacks and phishing/v ishing. Examples of publicized breaches and spear-phishing will be examine d\, such as the compromise of John Podesta&rsquo\;s email from &ldquo\;Gma il&rdquo\; advising he must change his password for security reasons.
END:VEVENT END:VCALENDAR