Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Events

Events

Here you can find events that your organization might find helpful. These range from in-person events to webinars on a variety of topics. 

Image
Events & News icon
Events
(please note that some of these events require advance registration)
Filter by topic
January 14
NIST Cyber AI Workshop #2

Join the NIST National Cybersecurity Center of Excellence (NCCoE) on January 14th, 2026, for a full-day hybrid workshop to discuss the Preliminary Draft of the NIST Cybersecurity Framework Profile for Artificial Intelligence (Cyber AI Profile). NIST will also provide an update regarding the Special Publication (SP) 800-53 Control Overlays for Securing AI Systems (COSAiS)

This workshop will feature in-person and virtual presentations in the morning, followed by in-person only breakout sessions in the afternoon. The breakout sessions will allow in-person attendees to engage directly with the NIST Cyber AI Profile team and for in-depth discussion of the preliminary draft of the Profile. 

Wednesday, January 14, 2026 - 09:00 (EST)
January 22
The Phishing Investigator: Spotting a Fake in Your Inbox

Join the UVI Information Services & Institutional Assessment team as they prepare USVI Small Businesses with the tools necessary to secure their data and electronic information. Learn common fallacies for small businesses regarding cybersecurity, the types of threats encountered, strategies for combating the threats, and how to get started. This interactive webinar is free of cost and includes a question-and-answer segment.

In today's digital age, phishing attacks have become increasingly sophisticated and prevalent. These deceptive tactics target individuals and organizations alike, aiming to compromise sensitive information, financial resources, and even the reputation of companies. It is imperative that we equip ourselves with the knowledge and tools necessary to identify and work to prevent these threats.  Our goal is that you leave the session with a heightened awareness and the ability to confidently navigate through potential phishing and other email threats.

This session’s topics will explain:

•            What is phishing and how it works

•            Different types of phishing attacks

•            Red flags to watch out for in suspicious emails

•           Best practices for protecting sensitive information

•            How to report phishing attempts

Thursday, January 22, 2026 - 10:00 (EST)
January 28
Resources for Ransomware Risk Management

Ransomware is a persistent risk to organizations of all sizes and sectors, and addressing this risk requires collaboration across the public and private sectors to develop practical resources for organizations to reduce their ransomware risks.

Speakers from the National Institute of Standards and Technology (NIST), the Center for Internet Security (CIS), and the Institute for Security and Technology (IST) will provide an overview of available ransomware risk management resources that help organizations get started with ransomware risk management by establishing foundational safeguards and building from there. Two resources that will be featured include: 

  • NIST Ransomware Risk Management CSF 2.0 Community Profile—published as an Initial Public Draft on January 13, 2025, reflects changes made to the Cybersecurity Framework (CSF) from CSF 1.1 to CSF 2.0 which identifies security objectives that support managing, detecting, responding to, and recovering from ransomware events. The publication can be used to gauge an organization’s readiness to counter ransomware threats, mitigate potential consequences of a ransomware event, and to develop a ransomware countermeasure playbook.
  • The IST and the Ransomware Task Force Blueprint for Ransomware Defense—which provides small to medium-sized enterprises (SMEs) with an actionable framework to defend against the most common attacks. It is comprised of a subset of Implementation Group 1 (IG1) Safeguards from the CIS Critical Security Controls (CIS Controls) v8 and aligned with NIST’s Cybersecurity Framework 2.0, to help SMEs understand where they can get started with establishing a ransomware risk management strategy.

Speakers will provide an overview of the resources above, including how they were developed collaboratively, and will also discuss current and future efforts to address ransomware risk management.  Ample time will be saved audience questions, ideas, and discussion.

Wednesday, January 28, 2026 - 14:00 (EST)
January 29
The Ransomware Survival Guide: Prevention, Containment, and Recovery

Join the UVI Information Services & Institutional Assessment team as they prepare USVI Small Businesses with the tools necessary to secure their data and electronic information. Learn common fallacies for small businesses regarding cybersecurity, the types of threats encountered, strategies for combating the threats, and how to get started. This interactive webinar is free of cost and includes a question-and-answer segment.

We will provide practical insights and actionable strategies to enhance your ability to effectively mitigate ransomware threats.

In this session, you will learn:

•            What is ransomware and how it works

•            Ransomware prevention

•            How to understand cyber threats and what to do about them

Thursday, January 29, 2026 - 10:00 (EST)