top of page
Yelow_edited_edited.jpg

Webinars

Join the Conversation

Education without hidden agendas

Demystifying Cyber Insurance
Recording

Listen to the recording of an interactive webinar that took place on 25 June with Integrated Cyber's Kevin Thomas, Pete Karolczak, who are joined by Kirsten Bay of Cysurance. 

\

In the webinar we talked about demystifying cyber insurance and specifically focused on the following areas:

  • We clarified its role and importance

  • Shared some horror stories

  • We (Kirsten) decrypted the jargon

  • And share examples of coverage options

 

If you listen to the 1-hour recording, you'll walk away with:

  • Knowing what to look for

  • Have knowledge of what you should be asking 

  • How to ensure you are properly insured

​

Gain the knowledge you need to make the right decision for your business, so you can sleep at night. 

Managing Your Largest Cyber Risk - Your Employees
Recording

This educational webinar focused on what you can do to help minimize vulnerabilities and how you can turn the table and provide just-in-time cyber education to make your job easier and keep your organization safe.

​

Zoom Webinar Recording Available for your immediate Viewing

​

We're pretty sure that one of these issues hit your hot-button: 

  • Our employees continue to click on links they shouldn’t

  • You have cyber prevention tools in place, but still have to react due to inappropriate behavior by your users

  • You’d love to see reporting on who is making you the most vulnerable

  • You would love to automatically coach employees after they do something they shouldn’t 

  • You think your one 4-hour cyber training session isn’t doing enough to keep you protected all year

  • You want your employees are always doing the right thing regarding cyber security

  • You want to ensure your employees aren’t opening any malicious links or emails

  • Threats are continually entering your environment

  • You’d like an easy way of explaining to management how much malware, ransomware, and other threats are continually entering your environment

bottom of page