Search Results
Bank Policies & Procedures: Incident Response Plan (PLM-250)
Lays out the steps to be followed should a bank experience a breach of data or loss of customer information. Includes an Incident Response policy, steps to take for specific types of incidents, a...
Regulation E: Overview (Individual)
The Electronic Fund Transfer Act of 1978, implemented by Regulation E, is a consumer protection act that establishes the rights, liabilities, protections, and responsibilities of consumers who...
Bank Policies & Procedures: Bank Secrecy/AntiMoney Laundering (PLC-109)
Provides procedures as required by the regulatory agencies. Includes information on exempt persons, internal records, currency transaction reports, Office of Foreign Assets Control, Customer...
Social Engineering Awareness (Individual)
This course explores what social engineering is, the types of social engineering attacks criminals use and the techniques they use to manipulate people into performing actions that either...
Regulation P: Consumer Privacy – In Depth (Individual)
The Gramm-Leach Bliley Act (GLBA), is implemented by Regulation P: Privacy of Consumer Financial Information. The GLBA limits when and how a bank may disclose nonpublic personal information about a...
IT Security: Credential Stuffing (Individual)
This course explores credential stuffing. Credential stuffing is a type of cyberattack in which user IDs and passwords obtained from a data breach on one service are used to attempt to log into...
IT Security: Work Off-Site (Individual)
This course examines the IT security risks associated with remote work. Learn to keep your computer, devices and home network secure, use public networks safely, and recognize phishing and targeted...
IT Security: Ransomware (Individual)
This course explores what ransomware is, how cyberthieves attack systems with ransomware, what IT Departments and employees can do to reduce the likelihood of ransomware attacks, and what IT...