Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Events
  3. Past Events

Past Events

Filter by topic
February 11
Beyond Basic Cybersecurity

Explore advanced cybersecurity tactics to strengthen your business against ever-evolving threats. In this no-fee webinar, we will guide you beyond the Cybersecurity Basics trainings into a deeper exploration of essential topics for building cyber resilience.

Join us on Tuesday, February 11th, at 1:00 pm PST / 4:00 pm EST for this webinar hosted by the NorCal Small Business Development Center. Zack Barton will lead a discussion with renowned cybersecurity specialist, Jacob Blacksten, to highlight the importance of password management, multi-factor authentication, emergency response plans, and staff training within today's digital space.

Tuesday, February 11, 2025 - 16:00 (EST)
February 6
University-Based Cybersecurity Clinics: Educating the Next Generation of Cybersecurity Leaders While Safeguarding Small Businesses

Colleges and universities have long been a valuable resource for small businesses in their communities. Examples of support and outreach include running start-up incubators and accelerators, hosting small business development centers, providing a source of interns and entry-level workforce members, hosting legal and medical clinics, and much more. Recently, higher education, with support from industry and government, has been addressing two critical questions in cybersecurity through an emerging network of cybersecurity clinics: 

  • How can we bolster the cybersecurity posture of small, under-resourced organizations in our community?
  • How can we build a stronger cybersecurity workforce by providing students with valuable, hands-on learning experiences?

Through the clinics, multidisciplinary teams of students work with faculty providing no-cost  cybersecurity services to the region’s small, under-resourced organizations—providing valuable workforce development experiences to students and important cybersecurity support to those organizations who need it the most. 

This webinar will provide an overview of cybersecurity clinics, while also highlighting experiences of students and small businesses who have participated in the program. The panel discussion will run for 45 minutes, with 15 minutes reserved at the end of the hour for questions. 

Opening Remarks: 

  • Rodney Petersen, Director, National Initiative for Cybersecurity Education (NICE), NIST

Panelists: 

  • Mehdi Abid, Cyber Program Coordinator, Department of Computer Science, University of Nevada, Las Vegas
  • Aisha Ali-Gombe, Ph.D., Associate Professor and Director, LSU Cybersecurity Clinic, Louisiana State University
  • Gary Anderson, Partner, Cardinal Capital, LLC
  • Keith Daniel Tan, Scholarship for Service(SFS) Student, University of Nevada, Las Vegas

Moderator: 

  • Daniel Eliot, Lead for Small Business Engagement, NIST
Thursday, February 6, 2025 - 14:00 (EST)
February 5
Cybersecurity Series: Ransomware and Cyberthreats

Join the  UVI Information Services & Institutional Assessment staff team as they prepare USVI Small Businesses with the tools necessary to secure their data and electronic information. Learn common fallacies for small businesses regarding cybersecurity, the types of threats encountered, strategies for combating the threats, and how to get started. This interactive webinar is free of cost and includes a question-and-answer segment.

In this session, you will learn:

•            What is ransomware and how it works

•            Ransomware prevention

•            How to understand cyber threats and what to do about them

We will provide practical insights and actionable strategies to enhance your ability to effectively mitigate ransomware threats.

Wednesday, February 5, 2025 - 10:00 (EST)
January 29
Cybersecurity Series: Phishing and Email Threat Awareness

Join the UVI Information Services & Institutional Assessment team as they prepare USVI Small Businesses with the tools necessary to secure their data and electronic information. Learn common fallacies for small businesses regarding cybersecurity, the types of threats encountered, strategies for combating the threats, and how to get started. This interactive webinar is free of cost and includes a question-and-answer segment.

This session’s topics will explain:

•            What is phishing and how it works

•            Different types of phishing attacks

•            Red flags to watch out for in suspicious emails

•            Best practices for protecting sensitive information

•            How to report phishing attempts

In today's digital age, phishing attacks have become increasingly sophisticated and prevalent. These deceptive tactics target individuals and organizations alike, aiming to compromise sensitive information, financial resources, and even the reputation of companies. It is imperative that we equip ourselves with the knowledge and tools necessary to identify and work to prevent these threats.  Our goal is that you leave the session with a heightened awareness and the ability to confidently navigate through potential phishing and other email threats.

Wednesday, January 29, 2025 - 10:00 (EST)
January 28
Introduction to Log Management (IR210)

The Cybersecurity and Infrastructure Security Agency (CISA) is proud to present the Introduction to Log Management (IR210) Cyber Range Training event. The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.

This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.

Log files provide the data that are the bread and butter of incident response, enabling network analysts and incident responders to investigate and diagnose issues and suspicious activity from network perimeter to epicenter. Participants will be introduced to basic principles of log management and configuration. Federal compliance regulations of log configuration and management including OMB Memo M-21-31 will also be introduced.

Experience these benefits and more: 

  • Common attack methods: Understand the importance of the configuration, management, and analysis of logs for incident response and identify key processes of log management. 
  • Practice in a realistic environment: Investigate and analyze log data for suspicious activity. Detect and correlate possible IOCs or malicious activity with threat intel. Exercises include configuring a DNS server, network device firewall, an operating system and more for propper logging.  
  • Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussions and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and offer relevant input to address peers' questions.

This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.

Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.

Tuesday, January 28, 2025 - 09:00 (EST)
January 16
Preventing DNS Infrastructure Tampering (IR206)

The Cybersecurity and Infrastructure Security Agency (CISA) is proud to offer the Incident Response Training event, Preventing DNS Infrastructure Tampering Cyber Range Training (IR206). The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.

This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.

DNS is one of the core foundations of the internet however, it continues to be one of the mechanisms attackers use to perform malicious activities across the globe. In this course participants will learn about various concepts associated with DNS, become familiar with DNS tools and mapping information, get introduced to common DNS tampering techniques, and gain an understanding of DNS mitigation strategies to enhance security.

Experience these benefits and more: 

  • Practice in a realistic environment: Analyze network and host-based artifacts and implement remediation changes for the identified vulnerabilities.  
  • Learn how to implement remediations: Course exercises include remediating vulnerabilities. 
  • Identify and mitigate vulnerabilities in real time: Students will identify DNS infrastructure tampering techniques and mitigate them. 
  • Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussion and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and offer relevant input to address peers' questions.

This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.

Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.  

Thursday, January 16, 2025 - 09:00 (EST)
January 15
Cybersecurity for Microbusinesses

Even if you are a small business not ready for federal contracting, you still need to protect your business from cybersecurity threats. This webinar will focus on the steps you can take to secure your business from cyberattacks. It will cover the actions you can take to make your information management system more secure. These actions will reduce your vulnerabilities and enable you to recover from cyber-attack. Securing your business from cyber exploits is one of the most important things you can do.

Presented by: Mike Olivier, Cybersecurity Advisor, San Diego, Orange, Imperial APEX Accelerator

Disclaimer:  The use of Artificial Intelligence (AI) tools or systems of any kind is strictly prohibited in our workshops. This policy is in place to ensure the protection of confidentiality, uphold security measures, and maintain the autonomy and originality of all participants. Thank you for your understanding and cooperation.

Wednesday, January 15, 2025 - 13:00 (EST)
January 11
Beyond CyberSecurity with Artificial Intelligence

We’ll start with an overview of fundamental CyberSecurity concepts and AI principles, then move on to examine AI-driven solutions for identifying and mitigating cyber threats. Through interactive demonstrations and case studies, you'll see AI’s practical applications in action.
In this workshop we will discuss:
1. Fundamentals of CyberSecurity and AI
2. AI Enhancements in CyberSecurity
3. Challenges and Risks of AI in CyberSecurity
4. Future Trends and Emerging Technologies
5.Lab- Use Chat GPT to create a CyberSecurity Plan for a Startup Business In Reno

Saturday, January 11, 2025 - 12:30 (EST)
January 10
Public Wireless Supply Chain Innovation Fund Notice of Funding Opportunity (NOFO) 3, “Software Solutions for Industry Verticals and Integration Automation” Information Session

The National Telecommunications and Information Administration (NTIA) is excited to share information about its recently released third Notice of Funding Opportunity (NOFO) for the Public Wireless Supply Chain Innovation Fund (Innovation Fund). This NOFO focuses on Software Solutions for Industry Verticals and Integration Automation, furthering the program's commitment to advancing open wireless network technologies.

The NOFO 3 Information Session provides a forum for potential applicants, their partners, and industry members to learn more about the Innovation Fund and the program's third NOFO and ask the program team questions. NTIA asks participants to send the questions they would like addressed during the open Q&A by 5:00pm EST on January 8, 2025 to the Innovation Fund email, InnovationFund@ntia.gov

Please note that the livestream will include closed captioning for deaf and hard-of-hearing participants. Registration for non-U.S. citizens (virtual and in-person) will close at 5:00pm EST on Friday, January 3, 2025Registration for U.S. citizen in-person attendance will close at 5:00pm EST on Wednesday, January 8, 2025. MITRE is a secure facility, and all in-person participants will need to show a valid government-issued I.D. to attend.

Please contact the Innovation Fund program team at InnovationFund@ntia.gov for assistance.

Friday, January 10, 2025 - 10:00 (EST)
January 7
Defend Against Ransomware Attacks Cyber Range Training (IR209)

The Cybersecurity and Infrastructure Security Agency (CISA) is proud to offer Incident Response Training event, Defend Against Ransomware Attacks Cyber Range Training (IR209). The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.

This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.

Ransomware is the fastest growing malware threat targeting home, business, and government networks. Anyone with a computer connected to the internet is a target. Ransomware infection is one computer, one person, one click away from penetrating a network’s defense. If just one computer becomes infected with ransomware it could quickly spread all over the network, which is why ransomware protection is critical. Ransomware incidents have become increasingly prevalent and pose an enormous risk to you and your organization’s critical infrastructure. In this training, participants will be introduced to common applications and process that harden network defenses, as well as key terms to be aware of in the prevention of ransomware attacks.

Experience these benefits and more: 

  • Common attack methods: Define ransomware and identify best practices and preventive measures to mitigate the impact of ransomware attacks. 
  • Practice in a realistic environment: Learn how to apply specific tools to configure and backup active directory policies, reset KRBTGT account passwords and create application allowlisting policies. 
  • Identify and mitigate vulnerabilities in real time: Students will identify malicious domains and mitigate them by establishing a sinkhole and by blocking the malicious domain.  
  • Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussions and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and offer relevant input to address peers' questions.

This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.

Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.

Tuesday, January 7, 2025 - 09:00 (EST)