Preventing DNS Infrastructure Tampering (IR206)
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to offer the Incident Response Training event, Preventing DNS Infrastructure Tampering Cyber Range Training (IR206). The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.
This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.
DNS is one of the core foundations of the internet however, it continues to be one of the mechanisms attackers use to perform malicious activities across the globe. In this course participants will learn about various concepts associated with DNS, become familiar with DNS tools and mapping information, get introduced to common DNS tampering techniques, and gain an understanding of DNS mitigation strategies to enhance security.
Experience these benefits and more:
- Practice in a realistic environment: Analyze network and host-based artifacts and implement remediation changes for the identified vulnerabilities.
- Learn how to implement remediations: Course exercises include remediating vulnerabilities.
- Identify and mitigate vulnerabilities in real time: Students will identify DNS infrastructure tampering techniques and mitigate them.
- Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussion and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and offer relevant input to address peers' questions.
This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.
Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.
Cybersecurity for Microbusinesses
Even if you are a small business not ready for federal contracting, you still need to protect your business from cybersecurity threats. This webinar will focus on the steps you can take to secure your business from cyberattacks. It will cover the actions you can take to make your information management system more secure. These actions will reduce your vulnerabilities and enable you to recover from cyber-attack. Securing your business from cyber exploits is one of the most important things you can do.
Presented by: Mike Olivier, Cybersecurity Advisor, San Diego, Orange, Imperial APEX Accelerator
Disclaimer: The use of Artificial Intelligence (AI) tools or systems of any kind is strictly prohibited in our workshops. This policy is in place to ensure the protection of confidentiality, uphold security measures, and maintain the autonomy and originality of all participants. Thank you for your understanding and cooperation.
Beyond CyberSecurity with Artificial Intelligence
We’ll start with an overview of fundamental CyberSecurity concepts and AI principles, then move on to examine AI-driven solutions for identifying and mitigating cyber threats. Through interactive demonstrations and case studies, you'll see AI’s practical applications in action.
In this workshop we will discuss:
1. Fundamentals of CyberSecurity and AI
2. AI Enhancements in CyberSecurity
3. Challenges and Risks of AI in CyberSecurity
4. Future Trends and Emerging Technologies
5.Lab- Use Chat GPT to create a CyberSecurity Plan for a Startup Business In Reno
Public Wireless Supply Chain Innovation Fund Notice of Funding Opportunity (NOFO) 3, “Software Solutions for Industry Verticals and Integration Automation” Information Session
The National Telecommunications and Information Administration (NTIA) is excited to share information about its recently released third Notice of Funding Opportunity (NOFO) for the Public Wireless Supply Chain Innovation Fund (Innovation Fund). This NOFO focuses on Software Solutions for Industry Verticals and Integration Automation, furthering the program's commitment to advancing open wireless network technologies.
The NOFO 3 Information Session provides a forum for potential applicants, their partners, and industry members to learn more about the Innovation Fund and the program's third NOFO and ask the program team questions. NTIA asks participants to send the questions they would like addressed during the open Q&A by 5:00pm EST on January 8, 2025 to the Innovation Fund email, InnovationFund@ntia.gov.
Please note that the livestream will include closed captioning for deaf and hard-of-hearing participants. Registration for non-U.S. citizens (virtual and in-person) will close at 5:00pm EST on Friday, January 3, 2025. Registration for U.S. citizen in-person attendance will close at 5:00pm EST on Wednesday, January 8, 2025. MITRE is a secure facility, and all in-person participants will need to show a valid government-issued I.D. to attend.
Please contact the Innovation Fund program team at InnovationFund@ntia.gov for assistance.
Defend Against Ransomware Attacks Cyber Range Training (IR209)
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to offer Incident Response Training event, Defend Against Ransomware Attacks Cyber Range Training (IR209). The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.
This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.
Ransomware is the fastest growing malware threat targeting home, business, and government networks. Anyone with a computer connected to the internet is a target. Ransomware infection is one computer, one person, one click away from penetrating a network’s defense. If just one computer becomes infected with ransomware it could quickly spread all over the network, which is why ransomware protection is critical. Ransomware incidents have become increasingly prevalent and pose an enormous risk to you and your organization’s critical infrastructure. In this training, participants will be introduced to common applications and process that harden network defenses, as well as key terms to be aware of in the prevention of ransomware attacks.
Experience these benefits and more:
- Common attack methods: Define ransomware and identify best practices and preventive measures to mitigate the impact of ransomware attacks.
- Practice in a realistic environment: Learn how to apply specific tools to configure and backup active directory policies, reset KRBTGT account passwords and create application allowlisting policies.
- Identify and mitigate vulnerabilities in real time: Students will identify malicious domains and mitigate them by establishing a sinkhole and by blocking the malicious domain.
- Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussions and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and offer relevant input to address peers' questions.
This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.
Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.
Intro to Cybersecurity
Empower your small business with a deep dive into cybersecurity basics at our upcoming Introduction to Cybersecurity event. Discover practical strategies to protect your business online. Join us for insights tailored to small businesses, ensuring your digital assets are secure. Do not miss out on the chance to boost your digital security knowledge.
This event will take place online using Microsoft Teams, please register to obtain for the login information. Please note, if you are planning to use a mobile device to access this webinar, you must first download the Teams app to your device.
SBA programs and services are extended to the public on a nondiscriminatory basis. For reasonable accommodation request please send an email to lado@sba.gov at least 7 days in advance.
Workshop on Updating Manufacturer Guidance for Securable Connected Product Development
NIST invites the cybersecurity and IoT communities to join a discussion on updating
-
IoT Device Cybersecurity Capability Core Baseline (NIST IR 8259A)
-
IoT Non-Technical Supporting Capability Core Baseline (NIST IR 8259B)
Topics like the convergence and rise of Industrial IoT (IIoT), the introduction of new guidance from NIST (e.g., Secure Software Development Framework, Privacy Framework, Cybersecurity Framework 2.0), and cybersecurity for legacy products, systems, and environments are just a few examples of considerations that NISTIR 8259 could incorporate or expand on in a revision.
This Workshop will begin a conversation around these topics to identify useful new additions to this core IoT guidance.
Registration for in-person participation will close on November 22, 2024 at 5:00pm.
Introduction to Log Management (IR210)
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to present the Introduction to Log Management (IR210) Cyber Range Training event. The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.
This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.
Log files provide the data that are the bread and butter of incident response, enabling network analysts and incident responders to investigate and diagnose issues and suspicious activity from network perimeter to epicenter. Participants will be introduced to basic principles of log management and configuration. Federal compliance regulations of log configuration and management including OMB Memo M-21-31 will also be introduced.
Experience these benefits and more:
- Common attack methods: Understand the importance of the configuration, management, and analysis of logs for incident response and identify key processes of log management.
- Practice in a realistic environment: Investigate and analyze log data for suspicious activity. Detect and correlate possible IOCs or malicious activity with threat intel. Exercises include configuring a DNS server, network device firewall, an operating system and more for propper logging.
- Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussions and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and offer relevant input to address peers' questions.
This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.
Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.
Energy Sector BOM Collaboration Webinar
DOE Office of Cybersecurity, Energy Security, and Emergency Response (CESER) is hosting a joint Energy Sector BOM Collaboration webinar in partnership with DHS Cybersecurity and Infrastructure Security Agency (CISA), and IEEE Power Systems Communications and Cybersecurity Technical Committee (PSCCC).
This webinar will include representatives from asset owners and operators (AOOs), vendors, and researchers in the energy sector all sharing their experiences and lessons learned from using or attempting to use BOMs for supply chain risk management. The webinar will consist of a series of presentations as well as two facilitated Q&A panels where vendors and AOOs will discuss the following topics: policies/regulations, value proposition, existing challenges, and where do we go from here.
Intro to Cybersecurity
Empower your small business with a deep dive into cybersecurity basics at our upcoming Introduction to Cybersecurity event. Discover practical strategies to protect your business online. Join us for insights tailored to small businesses, ensuring your digital assets are secure. Do not miss out on the chance to boost your digital security knowledge.
This event will take place online using Microsoft Teams, please register to obtain for the login information. Please note, if you are planning to use a mobile device to access this webinar, you must first download the Teams app to your device.
SBA programs and services are extended to the public on a nondiscriminatory basis. For reasonable accommodation request please send an email to lado@sba.gov at least 7 days in advance.