2017 will go down as the year that cybersecurity went mainstream. Every week there was a new announcement about businesses being affected by ransomware, phishing, intrusions and other attacks.
Let's make 2018 the year that we stop putting off important cybersecurity measures; it will be one resolution you're happy to keep.
The New York State Department of Financial Services (DFS) recently proposed a cybersecurity program for regulated organizations including banks and insurance companies. This requires regulated entities to establish and maintain a cybersecurity program to protect consumer information.
GreyCastle Security will explore the hidden risks and the response planning tactics that will help ensure your organization isn’t the next victim of cybercrime.
Ransomware has been around for years, however, CryptoLocker attacks have risen sharply in recent months leaving organizations exposed and contemplating paying for their data.
GreyCastle Security will provide much-needed information and a no-nonsense guide on ISO 27001:2013 certification.
Learn how you can build an efficient, cost-effective and meaningful cybersecurity program.
When it comes to your health, preventative care is always the better option. Even though you can’t know when a heart attack or stroke will strike, there are many different things you can do to lower your risk.
It's the same concept with cybersecurity. Preventative measures will lower the probability of a breach. If ignored, the result can deeply impact your organization's reputation and finances.
GreyCastle Security will cover the standards for risk assessment that work for almost all regulatory and compliance requirements.
Being able to respond efficiently and effectively to ransomware can make the difference between survival or getting chewed up and spit back out.
Although ransomware typically targets only targets a single user, attackers are learning different distribution and infection methods that can take your organization down for days, weeks, or potentially months.
Attorney F. Paul Greene and GreyCastle Security Security Strategist and Practice Lead Candice Wold will guide attendees on developing a realistic approach to the timeline as well as identify how current requirements from standards such as ISO 27001:2013 and Privacy Shield may affect your organization’s adherence to GDPR.
Your people are your first line of defense against cyberattacks – but do they know that?
In this session, you'll learn how to develop a cybersecurity awareness training program, how to get buy-in from executives and management, and how to reinforce cybersecurity training with employees.
While the cloud offers very real and measurable benefits, it also requires new thinking about the associated cybersecurity risks.
This session will provide recent real-world experiences with cloud providers and discuss important considerations for utilizing this new architecture. Case studies will be presented, and attendees will walk away with actionable advice for managing risk in their cloud(s).
You're storing and transmitting everything from educational records and medical records to PII and credit card data.
Let's face it - your organization is a big target.
There are threats from external attackers, malicious insiders, unaware and apathetic employees - and you want to understand how prepared you are. But not all pen tests are created equal.
If you are among the 60-75% of organizations that have been recently surveyed and are not in compliance with GDPR, you are probably facing a bevy of concerns.
GreyCastle Security’s Senior Security Specialist, Sarah Cushard, will help you respond to privacy requests and take the quickest path toward realistic GDPR compliance.
Based on recent high profile breaches, hackers have learned that contractors and other third-party providers can provide an opening into otherwise-secured corporate networks.
You’ve spent time, money and energy securing your organization internally, only to have the back door wide open.
Studies show that there are nearly 500,000 open cybersecurity positions in the United States, a 5,000% increase from 2010.
By "virtualizing" your cybersecurity function, you can expand your existing team with experts, when you need them. All for the price of a single cybersecurity resource.
Join GreyCastle Security as we introduce the next-generation concept of cybersecurity program "virtualization" and the benefits that it offers.
Unfortunately, when it comes to ISO 27001 certification, timelines for compliance can be truncated by external deadlines from third parties.
In this webinar, GreyCastle Security will help you learn how to respond to, or see, the quickest path toward ISO 27001 certification.
Cybersecurity exists for one reason: to protect the (assets of your) organization. Period.
This is your chance to learn about the simplest solution you’ve never seen. Join GreyCastle Security to understand how to get back to the basics and make cybersecurity a tool that everyone in the company understands, trusts and relies on to effectively manage risk.
It's essential to make your employees aware of the latest threats and cybersecurity best practices for protecting themselves and your business. However, awareness is not a "one and done" event; it is a continuous process of learning and adjusting.
In this webinar, you'll learn how to develop a cybersecurity awareness training program, how to get buy-in from executives and management, and how to reinforce cybersecurity training with employees.
Does the upcoming GLBA audit have your institution in a panic?
This is the perfect time to verify that you meet all the requirements. Would your risk assessment make the grade? What about your training program? What type of evaluation of your third-party service providers do you need and how should you document it?
The GLBA Safeguards Rule covers all of these items.
Money is missing, malware is exploding and the clock is ticking. In the new cyber environment, you're either failing to plan or planning to fail. This webinar will focus on one of the most critical elements in any Incident Response process - the Incident Response Go Bag.
Join GreyCastle Security as we journey into the heart of the first response and the tools and techniques that all responders should have ready to go.
Don't build a $100 fence around a $10 horse.
Data classification is the process of inventorying, labeling and defining handling requirements for assets according to their importance and sensitivity, yet it is as much art as it is science.
Join GreyCastle Security as we explore the barriers to classification, demystify the process and demonstrate how classification can save your organization time, money and energy.
2019, like years past, has been one of exuberant ups and catastrophic downs. Cybersecurity is still a fledgling industry with a penchant for entropy and a flair for hype. And an endless supply of radically disparate statistics from all corners of the industry proves only one thing - we're still in survival mode.
So what will our biggest challenges be 2019?
GLBA compliance is not a new concept.
Would your risk assessment make the grade? Do you need to prepare for GLBA audits?
Join GreyCastle Security's Vice President of Services to learn about why the risk assessment process must be run by the business.
GreyCastle Security identifies and demystifies seven of the top misconceptions about cybersecurity.
Join GreyCastle Security's Cybersecurity Solution Advisor Paul Robinson and Direction of Business Intelligence Sean Phillips as they guide attendees on how GreyCastle Security defines industry standards.
Join GreyCastle Security to understand how to get back to the basics and make cybersecurity a tool that everyone in the company understands, trusts and relies on to effectively manage risk.
Listen to GreyCastle Security's Vice President of Services speak on the six key steps to building your own Next-Gen Cybersecurity Program.
ISO 27001 can be frustrating and the clausal information can be very non-prescriptive.
Wil Seiler, Director of Product Management at GreyCastle Security, breaks down how ISO 27001 compliance can help your bottom line.