Home » Schedule

Schedule

All webinars are one-hour in length. Registration is free of charge to IBA membership. Click here to register.

Tuesday, Oct. 27

10:00 a.m. Time to Celebrate! WFH was an emergent success. What’s next for IT?
James Marks, Wipfli LLP, Eau Claire
With a great experience of a sudden work from home situation, now what is next from an IT perspective? What do you tell your board of directors, how do you open up your infrastructure while keeping them closed to attackers, and how can you retain the positive elements of technology implementations that resulted from COVID-19.

Thursday, Oct. 29

10:00 a.m. Elevating Your Fraud Prevention Strategies
Liz Little, SHAZAM, Inc.
What are the latest schemes, trends and tricks fraudsters are using to get your customer information? With ever-evolving tactics, it can be difficult to stay abreast of current trends. Learn the many ways criminals are gathering card information and what can be done to prevent fraud and card losses. Fraud detection systems, blocking transactions, transaction alerts and other important tools will be discussed. From chip cards to the increase in skimming attacks, we’ll discuss ways to keep fighting back.

Tuesday, Nov. 3

10:00 a.m. How to Get Great Results on Your Next IT Audit
Bob Hickok, Eide Bailly
Getting great results on your next IT audit or exam is important. Having confidence in your technology management is equally critical—and the two are directly related. This session will look at technology management best practices, as well as technology best practices specific to the banking industry, to help you manage the critical areas of your institution’s technology and cybersecurity. For more than 20 years, Bob Hickok has served community banks, performing and managing hundreds of IT controls reviews, vulnerability assessments, penetration tests and social engineering tests. As both a CPA and an IT technician for 30 years, he combines the skill sets of cybersecurity, auditing, technician and controls testing to provide a unique approach to IT auditing, security testing and consulting.

Friday, Nov. 6

10:00 a.m. Cyber-Insurance: You’re Not as Insured as You Think
John Lande, Dickinson Law, Des Moines
Fraudsters are targeting organizations of all kinds and sizes with the goal of stealing money and confidential information. In many cases, an organization’s only recourse is to seek reimbursement from its insurance company. However, many insureds are surprised to learn their “cyber-insurance” covers less than they thought, or provides no coverage at all.
This presentation will discuss current cyber-insurance issues through the lens of real case studies and address:
• Common policy disputes between insureds and their carriers
•.Types of insurance coverage and limitations of that coverage;
• What to expect when you submit an insurance claim
• Responding to an insurance company that denies coverage.

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 67 other followers