Oct 14

Cyber Series: GLBA Security Expectations, Internal Controls & the Human Factor

Registration Options & Pricing

Please select your membership status.

Live Webinar Includes

  • Unlimited Connections to the Live Webinar
  • Handout and Take-Away Toolkit
  • Available on Desktop, Mobile & Tablet
  • Presenter’s Contact Info for Follow-Up

Recorded Webinar Includes

  • Recording of the Live Webinar
  • Can be viewed anytime 24/7, beginning 2 business days after the webinar
  • Handout and Take-Away Toolkit
  • Available on Desktop, Mobile & Tablet
  • Free Digital Download, yours to keep
  • Share link with anyone at your bank
  • Presenter’s contact info for follow-up

12:00 pm – 1:30 pm PT
1:00 pm – 2:30 pm MT
2:00 pm – 3:30 pm CT
3:00 pm – 4:30 pm ET

Humans, also known as staff, are often the weak link in the cybersecurity chain. This webinar will identify effective controls and best practices to guard against the “human factor.” It will also teach you how to apply the FFIEC’s Cybersecurity Assessment Tool (CAT), why a GLBA risk assessment is needed, and where risk can arise.


  • Effectively use the FFIEC’s Cybersecurity Assessment Tool (CAT) to drive cyber risk control adoption
  • Identify and implement effective controls against the human factor
  • Define the need for GLBA risk assessment
  • Explain and justify controls to reduce email phishing
  • List 10 “best practice” IT controls for financial institutions


Take a deep dive into GLBA expectations and learn how to apply the FFIEC’s Cybersecurity Assessment Tool (CAT) and process to address those expectations. You’ll learn best practice internal controls that are tied back to GLBA expectations for running a safe and sound cybersecurity operation. Case studies highlighting the human factor in the security chain will be emphasized to demonstrate where risky exceptions can arise. This webinar will also address the threats of targeted attacks and phishing/vishing. Examples of publicized breaches and spear-phishing will be examined, such as the compromise of John Podesta’s email from “Gmail” advising he must change his password for security reasons.

Attendance certificate provided to self-report CE credits.

Save with this series!


This informative session is designed for IT steering committee members, information security officers, auditors, and compliance officers.


  • Top 20 information technology controls checklist
  • IT risk assessment template
  • Sample policies
  • Website links for additional reference material
  • Employee training log
  • Interactive quiz


NOTE:  All materials are subject to copyright. Transmission, retransmission, or republishing of any webinar to other institutions or those not employed by your financial institution is prohibited. Print materials may be copied for eligible participants only.

You might be interested in:

We provide bank webinars on compliance, lending, regulations, security, operations, new accounts, collections, fraud, security & other topics. For more information on bank education and online training opportunities, join our mailing list.