
Here you can find events that your organization might find helpful. These range from in-person events to webinars on a variety of topics.
(please note that some of these events require advance registration)
Cyber Security - Lessons From the Criminal Underground
Learn how to prevent and protect from data loss and data leakage resulting from cyber threats. At the end of the course, participants will have multiple, actionable steps to both recognize attacks as well as new behaviors that will thwart attacks.
How to Train Your Staff in Cyber Security
Join our cybersecurity expert as we discuss the fundamentals of how to provide an effective cyber security training to your staff.
Cyber Hygiene 101 Webinar
Keeping your data safe should be a top priority. With cyberattacks occurring every 11 seconds, every possible entry point must be secure. This session will identify the latest cyber threats and discuss what cyber policies you can implement today to build a solid cyber defense.
After signing up for this event, you will receive a confirmation email. In the email will be instructions to register via Zoom, when this step is completed, you will receive the login information.
CSF 2.0 Webinar Series: Deep-Dive into the CSF 2.0 Govern Function to Improve Cybersecurity
One of the major updates to CSF 2.0 is the creation of the Govern Function, highlighting the importance of ensuring cybersecurity capabilities support the broader mission through Enterprise Risk Management (ERM).
Governance is the process of determining enterprise objectives, setting direction to achieve those objectives, and monitoring performance to adjust strategy as necessary. Risk governance provides the transparency, responsibility, and accountability that enables managers to effectively manage risk (NIST IR 8286C).
In the second webinar in NIST’s new multi-part CSF 2.0 webinar series, we will provide a discussion covering:
- Demystifying what governance is.
- The role of the Govern Function in a cybersecurity-focused framework.
- Strategies for bidirectional communication between cybersecurity practitioners and leadership.
- How organizations of all sizes can put cybersecurity governance into practice using the CSF 2.0.
- How you can use the CSF in conjunction with other NIST publications (such as the NIST IR 8286 series, SP 800-37r2, etc.) to better integrate cybersecurity and enterprise risk management for governance oversight.
- CSF 2.0 implementation resources in support of cybersecurity governance.
Time will be reserved at the end for audience questions.