Tuesday
Apr 23
2019

Hacking the Weakest Link: The Role of Staff in Maintaining IT Security

Registration Options & Pricing

Please select your membership status.


Live Webinar Includes

  • One connection to the Live Webinar
  • Handout and Take-Away Toolkit
  • Available on Desktop, Mobile & Tablet
  • Presenter’s Contact Info for Follow-Up

Recorded Webinar Includes

  • Recording of the Live Webinar
  • Available 6 business days following Live date
  • Available for 6 months following Live
  • Handout and Take-Away Toolkit
  • Available on Desktop, Mobile & Tablet
  • Free Digital Download, yours to keep
  • Share link with anyone at your bank
  • Presenter’s contact info for follow-up
150+
Webinars
Available
100%
Satisfaction
Guaranteed

12:00 pm – 1:30 pm PT
1:00 pm – 2:30 pm MT
2:00 pm – 3:30 pm CT
3:00 pm – 4:30 pm ET

Today’s environment requires everyone to take more responsibility for protecting personal and employer digital assets from the various, never-ending digital attacks. Everyone benefits when individuals understand hackers’ primary methods, how to mitigate threats, and how to avoid being the weakest link.

This webinar will be a fresh look at hacking the weakest link – people duped by social engineering. Social engineering is commonly seen in phishing emails, fraudulent phone calls, and other confidence schemes. It is the easiest and most common method used by malicious attackers to gain unauthorized access to systems, resources, and data. Learn common real-world tricks and techniques that work and how to lower your risk. Get the latest tactics, tools, and techniques straight from an expert “white hat” hacker.

Attendance certificate provided to self-report CE credits.

HIGHLIGHTS

  • How to ensure you are not the weakest link in your institution’s cyber security program
  • The easiest and most effective ways to hack any organization
  • Protecting yourself and your institution from the most common scams, cons, and digital threats
  • How criminals exploit your trust and human nature
  • Keys to recognizing social engineering, what it is, how it works, and how to mitigate its effects
  • The three most common methods of attacking the human component of cyber security
  • Why lending someone your phone is the worst possible thing to do
  • The latest tactics, tools, and techniques used by successful hackers

  • TAKE-AWAY TOOLKIT
    • Useful website links and reference materials
    • Employee training log
    • NEW: Interactive Quiz to measure staff learning

DON'T MISS THESE RELATED WEBINARS!

"Teller Training Series: Frontline Fraud Prevention: Stopping Fraud at the Teller Line"
Wednesday, January 30, 2019

"Synthetic ID Fraud: What It Is, How It Works & Real-Life Scenarios"
Monday, March 11, 2019

"Mitigating a Data Breach: Forensics & Incident Response"
Wednesday, September 18, 2019

All webinars are available for six months after broadcast

WHO SHOULD ATTEND?

This informative session is best suited for employees, management, and leadership seeking current information, tactics, and tools to ensure a safer cyber security environment. Anyone who has digital information worth protecting and the willingness to protect it will benefit. A technical background is not necessary for this course.

 

NOTE:  All materials are subject to copyright. Transmission, retransmission, or republishing of any webinar to other institutions or those not employed by your financial institution is prohibited. Print materials may be copied for eligible participants only.

MEET THE PRESENTER

Brian Self Consulting
You might be interested in:

We provide bank webinars on compliance, lending, regulations, security, operations, new accounts, collections, fraud, security & other topics. For more information on bank education and online training opportunities, join our mailing list.