SlideShare a Scribd company logo
CBC Solutions
Trusted Procurement Advisors
Internet  Voice  Cloud
Cybersecurity is one of the biggest challenges to IT systems today
Improving security stance is a combined effort using people,
technology and process
CBC Solutions attacks cybersecurity concerns through integrated,
managed programs that include Endpoint Detection and
Response [EDR], Vulnerability Management and End-user
training
These tools are available as a package or individually
Cybersecurity is one of the biggest challenges to IT systems today
Improving security stance is a combined effort using people,
technology and process
CBC Solutions attacks cybersecurity concerns through integrated,
managed programs that include Endpoint Detection and
Response [EDR], Vulnerability Management and End-user
training
These tools are available as a package or individually
Webroot has combined its deep
R&D knowledge of spyware with
the industry-leading virus removal
definitions from Sophos to create
the most flexible, accurate, and
technically-evolved detection,
removal and blocking engine in the
industry
Endpoint clients are managed by a customizable web interface from a
cloud based management platform
SME Security provides Smart Shields that block functionality and other shields to protect specific
elements of the system that malicious software attacks
The Startup Shield blocks spyware programs
from writing critical registry keys for their
operations
The Installation Shield provides real-time
protection from spyware and virus processes
trying to start
The Memory Shield scans memory to catch
spies and viruses that are currently loaded
and terminates those processes
The Alternate Data Stream Shield prevents spies and viruses from starting from an alternate data stream
The ActiveX Shield prevents spyware from using ActiveX controls to install malicious software and
viruses
The BHO Shield stops the installation of unwanted toolbars that track Web site activities or install other
add-ons without your consent
The Admin Console is Web-based and enables multiple simultaneous administrators with full audit
logging of all user actions
SME Security maintains the enforcement of administrator-set policies for laptop or remote users while
they are away from the network
The Webroot Update Distribution Service delivers software and threat definition updates to clients
Configure specific workstation drives to
sweep for spyware and viruses
Set sweeps to include or exclude memory
and the registry
Exclude files of a specific size from sweeps
Determine threat disposition by threat
category or by exact name
Enable Smart Shields to protect the common
entry points, including changes to system
memory, registry entries, host files, startup
processes, browser hijackings, alternate data
streams and other security settings
“Poll Now” command allows administrator to
update workstation configuration, client
software or definitions on demand
Configure who receives alerts when
specific types of threats are detected
SNMP alerting for detected threats at
conclusion of sweeps
View enterprise-wide graphical
summaries of threats detected by group
or category
Display errors that occur during sweeps
to aid technical support in resolving the
problem
Generate reports of alerts and threats
found
Create custom reports if using SQL Server
database and Crystal Reports
Nodeware® is an in-demand cybersecurity solution that helps
businesses reduce their risk of ransomware or other cyber attacks
ü- Included in Standard Product
End-user training is the first line of defense when it comes to cyber-
security vulnerabilities.
Cyber-Security Awareness Training is an integrated solution to help
bring awareness to the security threats businesses face.
It is for this reason that CBC Solutions has put together this
integrated program.
Compliance requires it
PCI-DSS requires companies to train their users on how to identify and
respond to security threats https://www.cfisa.com/why-pci-compliance-training-is-a-
must-have-for-new-employees/
Security is everyone’s job
Each employee in the company will be exposed to some type of
security threat
Knowing how to identify a threat and react to it reduces the chance of
that threat infiltrating the environment
Customizable email templates
Informs users that they have
training due
Training reports
Evidence that users have
successfully completed training
Catalogs of online training modules
Short, non-technical training lessons
anyone can follow
Over 300 lessons available
Each lesson contains comprehensive, professional training to
teach end users what the risks are they face everyday by
handling credit cards and sensitive customer data
Sample Video
Hover video and press play
Each user has an account that tracks modules passed and
training due
Users receive an email that they need to take training
Managers are informed if required training exists
After passing the module, a certificate is sent to the end user
No, training modules are designed for every type of employee,
their level of technical skill has nothing to do with it
Sample Video
Hover video and press play
Since 95% of incidents are caused by
Human Error, training is the first line of
defense
End user training is required for PCI-
DSS certification
CBC Solutions training is trackable, and
reportable

More Related Content

Similar to Cyber-Security Package.pptx

Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS Attacks
Marcelo Silva
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
S.M. Towhidul Islam
 
Security Focus: Built-in Features to Safeguard Your Applications
Security Focus: Built-in Features to Safeguard Your ApplicationsSecurity Focus: Built-in Features to Safeguard Your Applications
Security Focus: Built-in Features to Safeguard Your Applications
akankshawande
 
31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf
ssusera5b321
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
Thierry Matusiak
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
PriyadharshiniVS
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
Dan Buckley
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)
Dan Buckley
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
Dan Buckley
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
Up2Universe
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
seqriteseo
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
Cisco Russia
 
PaloAlto Training pptx
PaloAlto Training pptxPaloAlto Training pptx
PaloAlto Training pptx
IDES TRAININGS
 
PaloAlto Training pdf
PaloAlto Training pdfPaloAlto Training pdf
PaloAlto Training pdf
IDES TRAININGS
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
Saravanan Manickam
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Michael Noel
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
Lumension
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
Manoj Kumar M
 
Azure security
Azure  securityAzure  security
Azure security
Lalit Rawat
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 

Similar to Cyber-Security Package.pptx (20)

Industry Best Practice against DDoS Attacks
Industry Best Practice against DDoS AttacksIndustry Best Practice against DDoS Attacks
Industry Best Practice against DDoS Attacks
 
Endpoint security
Endpoint securityEndpoint security
Endpoint security
 
Security Focus: Built-in Features to Safeguard Your Applications
Security Focus: Built-in Features to Safeguard Your ApplicationsSecurity Focus: Built-in Features to Safeguard Your Applications
Security Focus: Built-in Features to Safeguard Your Applications
 
31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
Advanced business endpoint protection (1)
Advanced business endpoint protection (1)Advanced business endpoint protection (1)
Advanced business endpoint protection (1)
 
Advanced Business Endpoint Protection
Advanced Business Endpoint ProtectionAdvanced Business Endpoint Protection
Advanced Business Endpoint Protection
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
PaloAlto Training pptx
PaloAlto Training pptxPaloAlto Training pptx
PaloAlto Training pptx
 
PaloAlto Training pdf
PaloAlto Training pdfPaloAlto Training pdf
PaloAlto Training pdf
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
 
How to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budgetHow to improve endpoint security on a SMB budget
How to improve endpoint security on a SMB budget
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
Azure security
Azure  securityAzure  security
Azure security
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 

Recently uploaded

Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 

Recently uploaded (20)

Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 

Cyber-Security Package.pptx

  • 1. CBC Solutions Trusted Procurement Advisors Internet  Voice  Cloud
  • 2. Cybersecurity is one of the biggest challenges to IT systems today Improving security stance is a combined effort using people, technology and process CBC Solutions attacks cybersecurity concerns through integrated, managed programs that include Endpoint Detection and Response [EDR], Vulnerability Management and End-user training These tools are available as a package or individually
  • 3. Cybersecurity is one of the biggest challenges to IT systems today Improving security stance is a combined effort using people, technology and process CBC Solutions attacks cybersecurity concerns through integrated, managed programs that include Endpoint Detection and Response [EDR], Vulnerability Management and End-user training These tools are available as a package or individually
  • 4. Webroot has combined its deep R&D knowledge of spyware with the industry-leading virus removal definitions from Sophos to create the most flexible, accurate, and technically-evolved detection, removal and blocking engine in the industry Endpoint clients are managed by a customizable web interface from a cloud based management platform
  • 5. SME Security provides Smart Shields that block functionality and other shields to protect specific elements of the system that malicious software attacks The Startup Shield blocks spyware programs from writing critical registry keys for their operations The Installation Shield provides real-time protection from spyware and virus processes trying to start The Memory Shield scans memory to catch spies and viruses that are currently loaded and terminates those processes The Alternate Data Stream Shield prevents spies and viruses from starting from an alternate data stream The ActiveX Shield prevents spyware from using ActiveX controls to install malicious software and viruses The BHO Shield stops the installation of unwanted toolbars that track Web site activities or install other add-ons without your consent
  • 6. The Admin Console is Web-based and enables multiple simultaneous administrators with full audit logging of all user actions SME Security maintains the enforcement of administrator-set policies for laptop or remote users while they are away from the network The Webroot Update Distribution Service delivers software and threat definition updates to clients
  • 7. Configure specific workstation drives to sweep for spyware and viruses Set sweeps to include or exclude memory and the registry Exclude files of a specific size from sweeps Determine threat disposition by threat category or by exact name Enable Smart Shields to protect the common entry points, including changes to system memory, registry entries, host files, startup processes, browser hijackings, alternate data streams and other security settings “Poll Now” command allows administrator to update workstation configuration, client software or definitions on demand
  • 8. Configure who receives alerts when specific types of threats are detected SNMP alerting for detected threats at conclusion of sweeps View enterprise-wide graphical summaries of threats detected by group or category Display errors that occur during sweeps to aid technical support in resolving the problem Generate reports of alerts and threats found Create custom reports if using SQL Server database and Crystal Reports
  • 9. Nodeware® is an in-demand cybersecurity solution that helps businesses reduce their risk of ransomware or other cyber attacks
  • 10. ü- Included in Standard Product
  • 11. End-user training is the first line of defense when it comes to cyber- security vulnerabilities. Cyber-Security Awareness Training is an integrated solution to help bring awareness to the security threats businesses face. It is for this reason that CBC Solutions has put together this integrated program.
  • 12. Compliance requires it PCI-DSS requires companies to train their users on how to identify and respond to security threats https://www.cfisa.com/why-pci-compliance-training-is-a- must-have-for-new-employees/ Security is everyone’s job Each employee in the company will be exposed to some type of security threat Knowing how to identify a threat and react to it reduces the chance of that threat infiltrating the environment
  • 13.
  • 14. Customizable email templates Informs users that they have training due Training reports Evidence that users have successfully completed training Catalogs of online training modules Short, non-technical training lessons anyone can follow Over 300 lessons available
  • 15. Each lesson contains comprehensive, professional training to teach end users what the risks are they face everyday by handling credit cards and sensitive customer data Sample Video Hover video and press play
  • 16. Each user has an account that tracks modules passed and training due Users receive an email that they need to take training Managers are informed if required training exists After passing the module, a certificate is sent to the end user
  • 17. No, training modules are designed for every type of employee, their level of technical skill has nothing to do with it Sample Video Hover video and press play
  • 18. Since 95% of incidents are caused by Human Error, training is the first line of defense End user training is required for PCI- DSS certification CBC Solutions training is trackable, and reportable