Cybersecurity Risk: The Session You Can't Afford to Miss
Topics will include:
- Introduction to Cybersecurity Risks: Discuss the current state of cyber threats and their impact on businesses.
- The Human Factor in Cybersecurity: Explore the role of employees in creating and preventing cybersecurity risks.
- Best Practices for Cybersecurity: Cover key steps organizations can take to minimize their risk of a cyber-attack.
- The Limitations of Cyber Insurance: Examine the limitations of relying solely on cyber insurance as a solution to cybersecurity risk.
- Real-World Cybersecurity Incidents: Discuss real-world examples of successful and unsuccessful cyber-attacks to illustrate the importance of proper cybersecurity measures.
- Building a Cybersecurity Culture: Discuss the importance of building a cybersecurity culture within an organization and provide tips for doing so.
- Q&A Session: Attendees will be able to ask questions and engage in a discussion with cybersecurity expert Tim Dubman.
SCORE Northeast NJ: Emerging Issues in Privacy and Cybersecurity
This webinar is on a topic of importance for individuals and business owners. The discussion will include perspectives on how privacy and cybersecurity issues may affect your business today and into the future. Join us to hear from an expert who will provide insights into:
- Relevant privacy ad cybersecurity laws that may affect your business.
- How to assess cybersecurity and privacy risks to your business
- What business owners can do now to prevent or minimize such risks
Small Business Cybersecurity Part 2: Authentication
This webinar dives into identifying and authenticating system users, processes, and devices before allowing access to information systems along with how to control access to those systems. The portion on Identification and Authentication will detail how to determine if system users and processes acting on behalf of users are identified and how to identify and authenticate those users and processes. The practice on Access Control will discuss how to ensure anyone or anything attempting to access a system is identified and authorized, describe the types of transactions authorized users are permitted to execute, explain how to identify, verify and control connections to external systems, and how to control information posted or processed on publicly accessible information systems like social media accounts.
SBA Women's Month Future of Business Cyber Hygiene, Jeri Prophet, Expert
The eyes of the IT world are once again focused on breaking news of a new zero-day exploit. This time it is a Russian actor trying to retrieve defense data. What will it be next? Security leaders and corporate executives should take note. Understanding what assets you have and their status is the first step to reducing the attack surface, improving cyber resilience and accelerating incident response. These are the core principals in good cyber hygiene.
Let’s Talk about Cybersecurity Risks and Trends for 2023
Small business leaders can expect more incidents of attack surface expansion, data security breaches, identity theft, and remote code execution attacks than in the previous year if they don’t take proactive cybersecurity measures.
Internet For All Webinar Series: Broadband Infrastructure Program 1-Year Anniversary Celebration
In February 2022, NTIA announced several Broadband Infrastructure Program (BIP) awards - the first of many Internet For All grants to be awarded throughout the next 12 months. Join NTIA leadership and BIP program staff for our BIP 1-year anniversary celebration to recognize the work of the fourteen grantees and highlight program milestones.
With the impact of the pandemic and some stores closed or partially open, more businesses are looking to bring their “shop” online. How do we protect ourselves and our companies against cyber criminals? We all know that we shouldn't email our account information to someone claiming to be a Nigerian prince. We've heard the terms "spyware", "ransomware", "hacking", "phishing", etc. But, what do we need to know to avoid these things? How can non-technical people identify attacks and how should we respond? Join Zack Barton as he discusses the basics of cybersecurity and goes over some of the details that every computer user should understand to protect themselves and their businesses.
Journey to the NIST Cybersecurity Framework (CSF) 2.0 | In-Person Working Sessions
Register to join an in-person working session to discuss potential updates to the CSF. At these half-day events, attendees will participate in working sessions to discuss the potential significant changes as outlined in the CSF 2.0 Concept Paper. These sessions will build on the February 15, 2023, virtual CSF 2.0 Workshop #2, as well as feedback from the 2022 NIST Request for Information (RFI) and the first CSF 2.0 workshop. Comments shared virtually at the February 15th workshop, in-person at the working sessions, or through other means will all be considered as input toward CSF 2.0.
Journey to the NIST Cybersecurity Framework (CSF) 2.0 | Workshop #2
Join NIST and expert panelists and leaders on February 15, 2023, for this second virtual workshop to discuss potential updates to the Cybersecurity Framework. This event will discuss potential significant changes to the Framework as outlined in the CSF Concept Paper, as well as build on feedback from the 2022 NIST Cybersecurity Request for Information (RFI) and the first workshop. This upcoming workshop will help to improve the CSF by engaging with a wide and diverse community of experts (the first CSF 2.0 workshop was attended by 4,000 participants from 100 countries).
This one-day informative event will include updates from NIST on CSF 2.0, as well as virtual panel discussions with experts in the community. Attendees are encouraged to participate in each panel topic via Slack —where they can offer comments on each topic and suggest questions to ask the panelists.
2023 5G Challenge Information Session Registration
This virtual informational webinar will summarize the key requirements for participation and outline test procedures. You will also have an opportunity to ask questions of NTIA/ITS and CableLabs, the organizer and host lab for the challenge.