Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Events

Events

Here you can find events that your organization might find helpful. These range from in-person events to webinars on a variety of topics. 

Image
Events & News icon
Events
(please note that some of these events require advance registration)
Filter by topic
May 7
Connecting Your Office Securely: Safeguard Networks and Future-Proof Your IT

In today's evolving threat landscape, small businesses must fortify their office networks against sophisticated cyber-attacks to ensure business continuity and data protection. This comprehensive guide provides actionable strategies for implementing robust security measures that shield your critical infrastructure while maintaining operational efficiency.

Learn how to deploy enterprise-grade firewalls, establish secure Wi-Fi networks with proper segmentation, and implement reliable connectivity solutions that form the foundation of a resilient IT environment. Whether upgrading existing systems or building new infrastructure, these proven security frameworks will help protect your digital assets from emerging threats while positioning your business for sustainable growth in an increasingly connected world.

By participating in this webinar, you'll gain the skills to:

  • Evaluate and implement appropriate firewall solutions for small business environments
  • Design secure Wi-Fi networks with proper access controls and segmentation
  • Establish redundant connectivity options to ensure business continuity
  • Develop a comprehensive network security policy tailored to your organization
  • Identify and mitigate common network vulnerabilities before they're exploited
  • Create a scalable IT infrastructure that accommodates future business growth
  • Implement effective monitoring systems to detect potential security breaches
Wednesday, May 7, 2025 - 12:50 (EDT)
May 7
Cyber Security - Lessons From the Criminal Underground

Learn how to prevent and protect from data loss and data leakage resulting from cyber threats. At the end of the course, participants will have multiple, actionable steps to both recognize attacks as well as new behaviors that will thwart attacks.

Wednesday, May 7, 2025 - 18:00 (EDT)
May 13
How to Train Your Staff in Cyber Security

Join our cybersecurity expert as we discuss the fundamentals of how to provide an effective cyber security training to your staff.

Tuesday, May 13, 2025 - 16:00 (EDT)
May 15
Cyber Hygiene 101 Webinar

Keeping your data safe should be a top priority. With cyberattacks occurring every 11 seconds, every possible entry point must be secure. This session will identify the latest cyber threats and discuss what cyber policies you can implement today to build a solid cyber defense. 

After signing up for this event, you will receive a confirmation email. In the email will be instructions to register via Zoom, when this step is completed, you will receive the login information.

Thursday, May 15, 2025 - 10:00 (EDT)
May 20
CSF 2.0 Webinar Series: Deep-Dive into the CSF 2.0 Govern Function to Improve Cybersecurity

One of the major updates to CSF 2.0 is the creation of the Govern Function, highlighting the importance of ensuring cybersecurity capabilities support the broader mission through Enterprise Risk Management (ERM).

Governance is the process of determining enterprise objectives, setting direction to achieve those objectives, and monitoring performance to adjust strategy as necessary. Risk governance provides the transparency, responsibility, and accountability that enables managers to effectively manage risk (NIST IR 8286C).

In the second webinar in NIST’s new multi-part CSF 2.0 webinar series, we will provide a discussion covering:

  • Demystifying what governance is.
  • The role of the Govern Function in a cybersecurity-focused framework.
  • Strategies for bidirectional communication between cybersecurity practitioners and leadership.
  • How organizations of all sizes can put cybersecurity governance into practice using the CSF 2.0.
  • How you can use the CSF in conjunction with other NIST publications (such as the NIST IR 8286 series, SP 800-37r2, etc.) to better integrate cybersecurity and enterprise risk management for governance oversight. 
  • CSF 2.0 implementation resources in support of cybersecurity governance.

Time will be reserved at the end for audience questions.

Tuesday, May 20, 2025 - 14:00 (EDT)