Password Security
Password Security for Financial Instiutions
Password Security for Executives
Password Security Brief
Need to Know – Password Security
Introduction to Account Takeover Attacks (ATO)
Data Security
Phishing
WORKed Episode 2 – Evite
Vishing
SpearPhishing
SMiShing
Reporting Phishing Emails
Recognizing Phishing Emails
Phishing
Phishing vs Spam
Phishing In Brief
Phishing for Executives
Need to Know – Phishing
Need to Know – Email Security
Need to Know – Downloading Suspicious Files
Marine Lowlifes – Whaling Shark
Marine Lowlifes – Spearphish
Marine Lowlifes – Common Phish
Marine Lowlifes – Clone Phish
Malicious Attachments
Business Email Compromise (BEC)
Breach Notification
Mobile Security
WORKed Episode 11- X-Men
Securing Mobile Devices
Need to Know – Mobile Security
Mobile Wi-Fi Security
Mobile Security
Mobile Security For Executives
How Secure Is Public WiFi – (Public WiFi)
Safe Web Browsing
WORKed Episode 3 – Robot Lawnmower
Underprotected APIs
Top 25 #1 – SQL Injection
Suspicious Hosts
Spoofed Email Address
Shopping Online Securely
Sensitive Data Exposure
Safe Web Browsing
Safe Web Browsing Brief
Public Networks and Computers
OWASP Top Ten Overview
Need to Know – Safe Web Browsing
Insecure Deserialization
Injection
Domain Name Spoofing
Cross-Site Scripting (XSS)
Cloud Services
Buffer Overflow
Broken Authentication and Session Management
Broken Access Control
Am I Hacked
Working Remotely
Working Remotely
Working Remotely for Financial Institutions
WORKed Episode 10 – Travel Stories
Securing Home Networks and Devices
Need to Know – Working Remotely
Malware
WORKed Episode 6 – Demons
Security Misconfiguration
Security Awareness for IT Professionals
Need to Know – Malware
Managing Software Assets
Malware
Malware for Executives
Malware Brief
Intelligent Personal Assistant
Intellectual Property
Insufficient Logging and Monitoring
Insufficient Attack Protection
Removable Media
WORKed Episode 1 – Bathroom
Removable Media
Removable Media for Financial Institutions
Removable Media Brief
Need to Know – Removable Media
Encryption
CJIS Policy – Media Protection
Physical Security
WORKed Episode 9 – Tailgating
WORKed Episode 8 – Eagle Eye
WORKed Episode 7 – Laptop Down
Protecting CUI
Physical Security
Physical Security Brief
PCI DSS – Physical Security
One Person’s Trash… (Dumpster Diving)
Need to Know – Physical Security
Need to Know – Challenging Identity
IoT Security
Introduction to NIST 800-171
Incident Response
How Much is Too Much – (Password Security)
FAR Code of Conduct
Creating a Cyber Secure Home
Complying with NIST 800-171
CJIS Policy – Physical Security
CJIS Policy – Dissemination and Destruction
A Few Extra Seconds (Lock Screens)
Social Engineering
WORKed Episode 5 – Mallomars
Who Can You Trust – (Social Engineering)
Using Components With Known Vulnerabilities
Social Media
Social Engineering
Social Engineering Brief
Sarbanes-Oxley Act (SOX)
Red Flags Rule
Privacy and PII
Privacy and PII Brief
Privacy and EU GDPR
PCI DSS
PCI DSS Brief
New Hire
Need to Known – Social Engineering
Need to Know – Security by Design
Need to Know – Privacy by Design
Need to Know – IoT
Need to Know – Introduction
Introduction
Introduction to CCPA
Insider Threats
Identity Theft
Help Desk
Handling SSA Provided Information
Gramm-Leach-Bliley Act (GLBA)
GDPR for Data Processors
FCPA
CJIS Security Policy
Avoiding Cybersecurity Risks for Executives
Anti-Money Laundering
Advanced Persistent Threat (APT)
