Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Events
  3. Past Events

Past Events

Filter by topic
June 13
Cyber Threats Beyond Your Computer

We’re well aware that our desktops and laptops are targets for cybercriminals. What about all the other devices hackers might attack, like your phone, security system, smart thermostat, wireless printer, and even the Bluetooth in your car? In this webinar, you’ll learn about the vulnerabilities that exist outside of your computer and what you can do to make those devices more secure.

Presenters: Paul Johnson, Cybersecurity Program Manager; Ian Moon, Cybersecurity Program Assistant; and Jim Drever, Regional Director and staff cybersecurity expert

Thursday, June 13, 2024 - 12:00 (EDT)
June 13
Using the CISA Incident Response Playbook at your Organization (IR211)

he Cybersecurity and Infrastructure Security Agency (CISA) is proud to present the Using the CISA Incident Response Playbook at your Organization (IR211) event Thursday, June 13, 2024, from 9:00 a.m. EDT to 1:00 p.m. EDT. The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering. 

This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.   

Produced in accordance with Executive Order 14028, “Improving the Nation’s Cybersecurity,” CISA released the Federal Government Cybersecurity Incident and Vulnerability Response Playbooks that provide federal civilian agencies with a standard set of procedures to respond to vulnerabilities and incidents impacting Federal Civilian Executive Branch (FCEB) networks. This course introduces students to the Incident Response Playbook that describes the process FCEB agencies should follow for confirmed malicious cyber activity for which a major incident has been declared or not yet been reasonably ruled out. The course will include a tabletop discussion format that follows a simulated IR event/scenario and guides students through the CISA IR checklist and IR phases. While the playbooks are intended for federal agencies, CISA encourages public and private sector partners to review them to help inform their own incident response practices. 

Experience these benefits and more:

  • Key guidance for organizations: Introduce the CISA Incident Response (IR) Playbook with an overview of the IR phases, key resources, standardizing shared practices, and the Incident Response Checklist. Learn about roles, responsibilities, and the importance of communication during an incident response. 
  • Lessons learned: This course also highlights lessons learned and common missteps when implementing an IR playbook. 
  • Peer activity and discussion: A guided incident response tabletop scenario and discussion where students will be required to follow the IR process using the CISA IR checklist. The tabletop discussion will help students to better comprehend and apply critical thinking throughout the NIST/CISA IR process. 

EVENT LOGISTICS

  • Date: Thursday, June 13, 2024  
  • Time: 9:00 a.m. EDT - 1:00 p.m. EDT 
  • Location: Online via WebEx 
  • CPE Credit: Participants can earn 4 CPE credits for attending this course. 
  • Attendee Requirements: This course requires active participation. Attendees can use government-issued computers or personal computers. A second monitor is recommended. 
  • Note: Audio is through WebEx; there is no external dial-in. 
  • Closed captioning (English only) will be available during this training event. Previously recorded webinars are available on the CISA YouTube Channel for playback in other languages, if required. 

Due to participation requirements, please register no later than 48 hours before the course starts. Cyber Insights will not accept registrations made less than 48 hours before the course start. 

Tags

Thursday, June 13, 2024 - 09:00 (EDT)
June 12
What You Need to Do to Secure Your Smartphone: Top 10 Security Settings for Your Phone *Webinar* - PW

Topic: Cybersecurity

Overview of Live Webinar

What You Need to Do to Secure Your Smartphone: Top 10 Security Settings for Android and iPhone

Attention all small business owners! Do you know how to use the security settings built into your Android or iPhone? If not, this webinar is for you. In this session, we will show you how ten (10) crucial security settings can help protect your business:

  1. Protection Against Unauthorized Access: Security settings such as passcodes, biometric authentication, and pattern locks prevent unauthorized users from accessing your device and the sensitive information stored within it.
  2. Data Privacy: Security settings help safeguard your personal and sensitive data, including photos, messages, emails, and financial information, from being accessed or stolen by cybercriminals or malicious apps.
  3. Prevention of Identity Theft: By enabling security features like two-factor authentication and device encryption, you reduce the risk of identity theft and unauthorized use of your online accounts and personal information.
  4. Remote Tracking and Wiping: Some security settings, such as Find My iPhone or Find My Device for Android, allow you to remotely locate, lock, or erase your device in case it gets lost or stolen, enhancing the chances of recovering it and protecting your data.
  5. Defense Against Malware and Viruses: Certain security settings and features, such as app permissions, app store security, and automatic software updates, help protect your device from malware, viruses, and other digital threats that could compromise its security and functionality.

Using the proper security settings on your Android or iPhone is essential for safeguarding your device, personal and business data, and online identity from bad actors and unfortunate accidents.

The webinar will be presented by the following speakers:

Dr. Teresa Piliouras(Link is external) - CEO and Founder, Technical Consulting & Research, Inc.(Link is external), an IT company specializing in AI, cybersecurity, quality management, and data analytics. Dr. Piliouras is a consultant, educator, inventor, and author. She holds a BS from the University of Illinois, an MBA from Iona College, and a PhD from NYU Tandon School of Engineering.

Pui Lam (Raymond) Yu(Link is external) - Executive Vice President Engineering at Technical Consulting & Research, Inc., has over 20 years of industry experience in Cybersecurity, Software Engineering, and Systems Engineering. He received his BEEE and MSEE from Stevens Institute of Technology and Rensselaer Polytechnic Institute, respectively, and his MSCS from New York University Tandon School of Engineering.

Adithya Rajendran(Link is external) - Cybersecurity Analyst at Technical Consulting & Research, Inc. He received his Bachelor of Science in Computer Science from Baskin Engineering at UCSC, and has a strong foundation in programming, data structures, algorithms, and software engineering.

Curtis Rowe II(Link is external) - Cybersecurity Analyst Intern, Technical Consulting and Research, Inc., received his BS in Cognitive Science from the University of California, San Diego.

Co-sponsor(s) & Partner(s): Prince William County Department of Economic Development(Link is external) & Prince William Chamber of Commerce(Link is external)

Cancellation Policy: Contact us earlier than OR 72 hours (3 days) prior to event. Kindly email – help@masonsbdc.org (preferred) or call 703-261-4105 to notify the team.

Special Instruction: This live webinar will be offered on the Zoom platform. You will receive a Zoom inivitation link after the registration.
 

Fee: No Cost

Webinar (Live)

Wednesday, June 12, 2024 - 10:00 (EDT)
June 12
Innovations in ICT Supply Chain Risk Management Conference (In-Person)

The Cybersecurity and Infrastructure Security Agency (CISA) will host the first annual Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force Conference, titled Innovations in ICT Supply Chain Risk Management, on June 12 at the MITRE Corporation in McLean, VA. Speakers and panelists will include CISA Director Jen Easterly and other senior officials from CISA, as well as leaders from the national security and cyber community, Task Force members, C-suite executives, and SCRM experts. Come engage with these leaders as they discuss critical and emerging topics, technologies, and resources for mitigating and reducing risks to the global ICT supply chain. 

Wednesday, June 12, 2024 - 09:00 (EDT)
June 4
IT & Cybersecurity Essentials Part 3: Advanced Security Tools

This is Part 3 of a five part IT & Cybersecurity Essentials series. This is an online-only event.***

Is your small business ready for a cyber attack? The Indiana SBDC reports that 88% of small business owners recognize their vulnerability to cyber-attacks, yet over 50% lack a cybersecurity response plan. Ignoring this threat is no longer an option. 

This webinar series will help you understand the threats facing small businesses, security language and acronyms, security measures to take, tools available, compliance requirements, and how to prepare for a cyber attack. 

Agenda for Part 3-Advanced Security Tools:

  • Firewall and Internet usage
  • How to make a secure password and MFA
  • Securing your Wifi
  • EDR, MDR, SIEM, XDR explained
  • Q&A

Our Presenter:

Kenny McMichael has over 18 years of experience in the IT industry working with small to midsize businesses. He is currently the IT Director and HIPPA Compliance Officer for the Digestive Care Center in Newburgh, IN. Kenny is an alumni of Ivy Tech and the University of Southern Indiana, a proud father of two young children, and a lover of technology.

Resources:

The Indiana SBDC has a robust toolkit available for small business owners. Visit  https://isbdc.org/cybersecurity-resources/(Link is external) to download the Cyber Workbook and make a plan to secure your business's valuable assets.

Fifth Third Bank(Link is external) is a sponsor of the Southwest Indiana SBDC and makes programming like this possible.

Tuesday, June 4, 2024 - 17:00 (EDT)
May 23
Combating Social Engineering Attacks

Learn strategies for mitigating escalating cybersecurity threats!

As social engineering attacks continue to evolve and escalate, businesses must arm themselves with effective defense strategies. This comprehensive resource delves into the world of social engineering, offering insights into the latest tactics used by cybercriminals to manipulate employees and gain unauthorized access to sensitive information. With the right knowledge and proactive measures in place, businesses can strengthen their security posture and safeguard against the ever-growing menace of social engineering attacks.

Thursday, May 23, 2024 - 12:30 (EDT)
May 23
Cybersecurity 101 for Small Business

In this training, we will explore essential strategies that all small businesses should use to safeguard their operations. This includes guidelines, both technical and non-technical measures, and various solutions to protect your data and network. We'll also delve into prevalent threats today and discuss how inadequate cybersecurity could impact your business. 

Overall, investing in cybersecurity is not just a protective measure but also a strategic decision that contributes to the long-term success and resilience of small businesses in today's digital landscape.

The Texas South-West SBDC's have partnered together to bring you expert content to help your small business grow and succeed.

 

Speaker: 

Troy Richardson, CISSP, Senior Business Development Specialist - SBDC Center for Government Contracting 

Thursday, May 23, 2024 - 11:00 (EDT)
May 21
IT & Cybersecurity Essentials Part 2: Staff Training & Awareness

***This is Part 2 of a five part IT & Cybersecurity Essentials series. This is an online-only event.***

Is your small business ready for a cyber attack? The Indiana SBDC reports that 88% of small business owners recognize their vulnerability to cyber-attacks, yet over 50% lack a cybersecurity response plan. Ignoring this threat is no longer an option. 

This webinar series will help you understand the threats facing small businesses, security language and acronyms, security measures to take, tools available, compliance requirements, and how to prepare for a cyber attack. 

Agenda for Part 2-Staff Training & Awareness:

  • Employee Roles
  • Training & Culture
  • Tools to help
  • Q&A

Our Presenter:

Kenny McMichael has over 18 years of experience in the IT industry working with small to midsize businesses. He is currently the IT Director and HIPPA Compliance Officer for the Digestive Care Center in Newburgh, IN. Kenny is an alumni of Ivy Tech and the University of Southern Indiana, a proud father of two young children, and a lover of technology.

Resources:

The Indiana SBDC has a robust toolkit available for small business owners. Visit https://isbdc.org/cybersecurity-resources/ to download the Cyber Workbook and make a plan to secure your business's valuable assets.

Fifth Third Bank is a sponsor of the Southwest Indiana SBDC and makes programming like this possible.

Tuesday, May 21, 2024 - 17:00 (EDT)
May 16
ONLINE: Cyber Security Post Pandemic for Small Business and Home

Post Covid-19 Small Businesses and Startups are challenged with the challenge of providing a secure and high performance work space for all collaborators.
2023 Small Business Cyber Issues Include:
1. Retooling for remote work created new vulnerabilities
2. Ransomware is more prevalent than before the pandemic
3. IoT and the supply chain has experienced new levels of cyber attacks
4. Expansion of cloud services increases complexity and depth of cyber attacks
5. Mobile computing and wearable’s are more of a target today
6. Phishing is a popular methodology for cyber terrorists
7. Insider threats are more prevalent than ever
8. Data privacy elevated to a primary organizational objective
9. Artificial Intelligence and Expert Systems becoming as component of cyber security
10. Cyber Cold war Security Perspectives

Register

Thursday, May 16, 2024 - 17:00 (EDT)
May 16
Cybersecurity Awareness Workshop for Small Business

How would you deal with a breach if and when it occurs? It can happen to anyone and any size business. Learn the signs you've been hacked, what to do, as well as how to safeguard your business operations including yourself, your employees, and your customers. It's time to grasp cybersecurity, and you'll learn the simple, straightforward steps from our experienced, engaging instructor.

 

This training will focus on cybersecurity awareness for small businesses and will cover:

- What is cybersecurity and information security?

- Understanding and managing business risks

- Safeguarding information (NIST cybersecurity framework)

- Working safely and securely: best practices for business

- Compliance, rules, and regulations overview

Thursday, May 16, 2024 - 17:00 (EDT)