Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Events
  3. Past Events

Past Events

Filter by topic
September 11
Hacked Headlines: What Recent Cyber Attacks Teach Us About Small Business Security

From major ransomware incidents to attacks on critical infrastructure, cyber headlines are everywhere. But what do these threats mean for small businesses?

This webinar decodes recent high-profile breaches—like those affecting healthcare systems, government agencies, and retailers—and highlights lessons small businesses can apply to prevent similar risks.

Thursday, September 11, 2025 - 12:30 (EDT)
September 9
Topic Business Builder Workshop: AI Cybersecurity Essentials

In a new age of artificial intelligence with deep fake technology, protecting your small business from cyber threats can feel overwhelming. Cut through the noise with West Central MN SBDC Associate Director, Amy Anderson, to learn some straightforward strategies to keep your business cyber safe.

Tuesday, September 9, 2025 - 16:30 (EDT)
September 9
Made to Grow: Cybersecurity Training for Manufacturers

Join us for a free virtual workshop to learn more about the federal resources available to help protect your company against cyber-attacks. The U.S. Small Business Administration (SBA), U.S. Cybersecurity & Infrastructure Security Agency (CISA), and the Naval Criminal Investigative Service (NCIS) will be on hand to provide training on Cybersecurity and Counterintelligence, specifically for manufacturers and exporters. 

Cyber and insider threats pose significant risks to organizations, networks, and critical infrastructure. Cyber threats involve malicious activities that compromise the confidentiality, integrity, and availability of systems and data, often executed by external actors but sometimes involving insiders who exploit their access. The insider threat refers to the potential for individuals with authorized access to harm their organization, either intentionally or unintentionally. These threats are significant concerns for both cybersecurity and counterintelligence.

In this training, participants will receive valuable insights from Federal agencies responsible for cybersecurity and counterintelligence initiatives. These initiatives focus on addressing advanced threat actors and managing the evolving threat landscape. Attendees will have the opportunity to engage with our presenters by asking questions and discussing concerns related to cyber and insider threats. Our presenters will share effective strategies for asset protection and threat mitigation.

Tuesday, September 9, 2025 - 09:30 (EDT)
September 2
NIST NCCoE Cyber AI Profile Virtual Working Session Series: Thwarting AI-enabled Cyber Attacks

Join the NIST NCCoE soon for a series of virtual working sessions to provide input on the NIST Cybersecurity Framework (CSF) Cyber Artificial Intelligence (AI) Profile (“Cyber AI Profile). These will serve as a continuation of the April workshop and are intended for cybersecurity and AI leaders. The goal is for attendees to provide detailed, technical input to inform the Profile’s development.  

Each session in this series will explore one of the three Focus Areas planned for the Cyber AI Profile. We will use the Categories in the CSF 2.0 Core to guide our discussions. Topics will include: 

  • Recap of NIST’s relevant work completed.
  • Questions and feedback regarding Focus Area descriptions.
  • Identifying key AI considerations for CSF 2.0 Categories.   

Session #3 Topic Background: Thwarting AI-enabled Cyber Attacks 

There are a multitude of ways AI is enabling cybersecurity adversaries. For example, AI capabilities are increasing the ease with which adversaries can exploit vulnerabilities as well as expand capabilities for generating new effective attacks, including developing and executing customized attacks that are targeted for a particular organization. Adversarial use of AI may also amplify risks in the supply chain. These changes emphasize needs for modifying cybersecurity practices, such as those around red teaming and cyber-attack detection. This working session will explore how the Cyber AI Profile can help organizations focus on activities that build resilience in the face of these new threat vectors. 

Who should attend? 

These events are open to stakeholders from industry, academia, and government that have expertise to share regarding cybersecurity for AI and AI for cybersecurity.  Please come ready to share your knowledge and insights during these interactive working sessions! 

Agenda: 

Each session in this series will focus on a single Focus Area in the Cyber AI Profile. We will use the Categories in the Cybersecurity Framework 2.0 Core to guide our discussion. Topics will include: 

  • Recap of work completed to date
  • Questions and feedback regarding Focus Area descriptions
  • Identifying key AI considerations for CSF 2.0 Categories  

Prepare to Participate: 

To prepare for participation in this process, we recommend reviewing the Cybersecurity Framework 2.0 Core and learning more about the Cyber AI Profile development effort by reviewing the following resources: 

Visit the event pages for the Securing AI System Components and Conducting AI-enabled Cyber Defense sessions to learn more! If you are unable to attend your desired session, you are welcome to provide us feedback any time by emailing us: [email protected]

Tuesday, September 2, 2025 - 13:00 (EDT)
August 27
Lock It Down! Cybersecurity Tactics for Small Businesses

Small businesses are increasingly targeted by cyber threats, often with limited resources to respond. This session equips business owners with practical knowledge and tools to protect their operations, customers, and reputation.

Session highlights:

  • Learn how cyber threats impact small businesses and why awareness matters.
  • Recognize phishing, ransomware, and other risks that target small enterprises.
  • Hear about local incidents to understand vulnerabilities close to home.
  • Understand the financial, legal, and operational consequences of cyberattacks.
  • Build a foundation for safer business practices and data protection.
  • Develop daily habits to reduce risk and improve security.
  • Discover affordable solutions tailored for small business needs.
  • Foster awareness among staff and build a security-first mindset.
  • Stay informed about regulations and responsibilities affecting your business.
Wednesday, August 27, 2025 - 15:00 (EDT)
August 27
NIST NCCoE Secure Software Development (DevSecOps) Virtual Event

Join the NIST National Cybersecurity Center of Excellence (NCCoE) on August 27, 2025 for a virtual event dedicated to exploring Secure Software Development, Security, and Operations (DevSecOps) practices. This interactive event will showcase the NCCoE’s plans to develop guidelines that demonstrate the implementation of best practices based on NIST’s Secure Software Development Framework (SSDF) and gather feedback to inform the project.

Wednesday, August 27, 2025 - 13:00 (EDT)
August 26
NIST NCCoE Cyber AI Profile Virtual Working Session Series: Securing AI System Components

Join the NIST NCCoE for a series of virtual working sessions to provide input on the NIST Cybersecurity Framework (CSF) Cyber Artificial Intelligence (AI) Profile (“Cyber AI Profile). These will serve as a continuation of the April workshop and are intended for cybersecurity and AI leaders. The goal is for attendees to provide detailed, technical input to inform the Profile’s development.  

Each session in this series will explore one of the three Focus Areas planned for the Cyber AI Profile. We will use the Categories in the CSF 2.0 Core to guide our discussions. Topics will include:

  • Recap of NIST’s relevant work completed.
  • Questions and feedback regarding Focus Area descriptions.
  • Identifying key AI considerations for CSF 2.0 Categories.   

Session #1 Topic Background: Securing AI System Components 

The adoption of AI into existing infrastructures introduces new threats and vulnerabilities across data, models, infrastructure, and applications, resulting in unique and diverse cybersecurity and business challenges. These new risks highlight the need for considerations in the areas of governance, risk management strategies, and supply chain, as well as changes to existing cybersecurity practices around access control and authorization policies, updated employee training, revised service agreements with 3rd party AI providers, and network baselines.  This working session will explore how the Cyber AI Profile can support organizations in identifying and mitigating the cybersecurity risks associated with deploying systems in their organizational ecosystems. 

Who should attend? 

These events are open to the public.  We encourage cybersecurity leaders from industry, academia, and government to share expertise on cybersecurity for AI and AI for cybersecurity.  Please come ready to share your knowledge and insights during these interactive working sessions! 

Prepare to Participate: 

If you are unable to attend your desired session, you are welcome to provide us feedback any time by emailing us: [email protected]

To prepare for participation in this process, we recommend reviewing the CSF 2.0 Core and learning more about the Cyber AI Profile development effort by reviewing the following resources: 

Visit the event pages for the Conducting AI-enabled Cyber Defense and Thwarting AI-enabled Cyber Attacks sessions to learn more and register! If you are unable to attend your desired session, you are welcome to provide us feedback any time by emailing us: [email protected]

Tuesday, August 26, 2025 - 13:00 (EDT)
August 19
NIST NCCoE Cyber AI Profile Virtual Working Session Series: Conducting AI-enabled Cyber Defense

Join the NIST NCCoE soon for a series of virtual working sessions to provide input on the NIST Cybersecurity Framework (CSF) Cyber Artificial Intelligence (AI) Profile (“Cyber AI Profile). These will serve as a continuation of the April workshop and are intended for cybersecurity and AI leaders. The goal is for attendees to provide detailed, technical input to inform the Profile’s development.  

Each session in this series will explore one of the three Focus Areas planned for the Cyber AI Profile. We will use the Categories in the CSF 2.0 Core to guide our discussions. Topics will include: 

  • Recap of NIST’s relevant work completed.
  • Questions and feedback regarding Focus Area descriptions.
  • Identifying key AI considerations for CSF 2.0 Categories.   
Tuesday, August 19, 2025 - 13:00 (EDT)
August 14
NIST Small Business Cybersecurity Webinar: Protecting Your Small Business from Phishing Risks

Phishing is one of the most common types of cyber crime. These scams use convincing emails or other messages, such as text messages or social media messages, to trick users into opening harmful links, downloading malicious software, or submitting sensitive information, such as credentials. These messages are often disguised as coming from a trusted source, such as a bank, credit card company, or even a leader within the business.

Small and medium-sized businesses are not immune to phishing. They are at risk just like their larger counterparts—only smaller organizations typically have fewer resources to prepare for and mitigate phishing risks. However, even with fewer resources, there are still proactive steps organizations of all sizes can take to reduce phishing risks. 

During this NIST small business cybersecurity webinar, we will convene a panel to highlight:

  • An overview of different types of phishing attacks in addition to modern, real-world examples;
  • Why it’s important to be proactive in protecting your business against phishing;
  • Tips for how to spot a phishing attempt;
  • Steps to take if you become the victim of a phishing scam;
  • Practical steps small businesses can take to reduce your likelihood of falling victim to phishing attempts; and
  • Free phishing resources available to businesses for staff training.

Speakers:

  • Dr. Shanée Dawkins, Computer Scientist, Visualization and Usability Group, NIST
  • Daniel Eliot, Lead for Small Business Engagement, Applied Cybersecurity Division, NIST
  • Lessie Skiba, Deputy Managing Director, Cyber Readiness Institute
Thursday, August 14, 2025 - 14:00 (EDT)
August 14
Cybersecurity in a Changing Regulatory Environment: What Small Businesses Need to Know

Small business owners who understand how changes in the cybersecurity landscape affect their operations can make proactive decisions to protect their customers, systems, and brand.

 As federal priorities shift, so do the risks and responsibilities for small business owners trying to stay secure in an increasingly digital world. Learn how regulatory shifts impact small businesses and how to navigate changing compliance requirements.

Stay ahead. Stay informed.

Thursday, August 14, 2025 - 12:30 (EDT)
Image
Event calendar icon