The world of cybersecurity is ever-changing and cyberattacks continue to expand in scale and scope – and are oftentimes targeted at local government organizations and schools. It’s nearly impossible to keep up with the evolving threat environment and cybersecurity best practices, especially when many teams are juggling with competing priorities and limited resources.
Is your team struggling with developing a powerful, all-encompassing cybersecurity program for your organization? Do you need some pointers on how to help build and maintain a strong and resilient security framework? Join Tyler Technologies for a series of webinars where we’ll take a deep dive into cybersecurity program components, all aimed at helping you mature and reinforce your security practices.
Connect with cybersecurity expertise by viewing these on-demand webinars.
Webinars On-Demand

Current Threat Environment and Lessons from Your Peers
Every day, networks across all organizations – large, small, public, or private – are at risk for a cyberattack. Cybercriminals are constantly developing new techniques that allow them to easily get through traditional defenses without detection. With the proper tools and knowledge, though, you can learn how to spot these suspicious activities.
In this webinar, we’ll hear from Ron Bernier, Director of Tyler Detect™, about the current threat environment and the outlook for the 2020 landscape. Learn about common risk behaviors that have recently been detected in your peers’ networks and how to go about mitigating them.
Takeaways:
- Learn threats posed in 2020
- Uncover the current risk behaviors that your peers are facing
- Learn how to mitigate the threat risk within your organization

How to Develop and Mature a Security Program
There is no end game when it comes to cybersecurity. It's not a destination. It’s an ongoing, evolving process. Your goal is to achieve cyber resiliency – the ability to prepare for and adapt to changing conditions, so you can detect threats and recover rapidly from disruptions. This means taking a strategic approach – one that includes people, processes, and technology. This can seem like a daunting task, especially if you’re just getting started building a program.
Join us for a live webinar where we’ll hear from a Tyler Cybersecurity professional who will discuss best practices for your program development, risk assessment, training, tech testing, and threat detection.
Takeaways:
- Learn how to build an effective cybersecurity program using a risk-based approach without overwhelming your budget or resources
- Learn best practices for maturing your program and staying resilient
- Discover how to achieve the best ROI on your cybersecurity investment

Social Engineering: How to Detect Fraud
Your employees are an important first line of defense against a cyberattack. Unfortunately, they are also your weakest link. Social engineers are very adept at tricking people to get what they want. Whether trying to acquire sensitive information or gain access to a restricted area, they prey on our basic human nature by building trust and confidence.
In this lively session, Tyler Technologies’ veteran social engineer Max Greene will educate you on the threat that social engineering poses to your organization.
Takeaways:
- Learn common social engineering tactics and tips for stopping cybercriminals in their tracks
- Gain insight on the types of fraud that you can expect from a social engineering attack
- Hear real-world experiences from the field
- Get the necessary tools to defend against these common attacks

Testing Your Cybersecurity Program
Exposing risks in your environment can help to inform your cybersecurity strategy and improve your resilience. That’s why your organization should regularly audit your security measures and conduct tests to find out where they’re vulnerable. Penetration testing help prevent data breaches, understand security weaknesses and test security controls. In this webinar, we will cover the fundamentals of a successful cyber assessment program, how it fits into your overall cybersecurity program, and how to get started.
In this webinar, a Tyler Cybersecurity professional will cover the fundamentals of a successful cyber assessment program, how it fits into your overall cybersecurity program, and how to get started.
Takeaways:
- Learn how cyber assessment can help protect you from common cyberattacks
- Understand the differences between a penetration test and a vulnerability assessment
- Discover which types of testing are used to address different organizational maturity levels
- Uncover the right types of test engagement given your organizational needs

Meaningful Cybersecurity Threat Intelligence: Building a Program to Improve Resilience
Approaching the development of a Threat Intelligence Program is akin to any other mission-critical function. It is best managed as an important component of organizational intelligence supporting a business strategy, rather than a “check-box” item. Well-managed execution of this critical function will make any organization better able to predict and avoid danger, respond to emerging threats, and thereby, improve overall resilience.
Join a Tyler Cybersecurity professional for a discussion on what a successful Threat Intelligence Program looks like.
Takeaways:
- Learn how to build a new program and improve your existing one
- Obtain actionable tips for gathering, analyzing, distributing, and sharing threat intelligence
- Find out how having a Threat Intelligence Program can increase your organizations’ resiliency

Reporting Up: How to Measure the Success of Your Cybersecurity Program
Countless executives have noted that measurement is a key for improvement and progress. However, measuring cybersecurity is a challenging and often frustrating experience for all levels of an organization. During this session, you will learn about where to start and how to derive cybersecurity measures that drive decision-making.
Measuring what matters is important to ensure that limited resources are focused on collecting, analyzing, and reporting on data that leads to business success. This session will help you identify cybersecurity metrics that align with your business objectives and resonate with leaders.
Takeaways:
- Learn which cybersecurity metrics you should be focusing on – and which ones you can avoid
- Discover how to take a holistic approach to measuring cybersecurity program success
- Learn how to comprise an easy-to-understand report for top executives