Border Gateway Protocol Security Workshop
The Public Safety and Homeland Security Bureau will host a workshop on Border Gateway Protocol (BGP) security which is central to the Internet’s global routing system. This workshop will highlight the critical importance of addressing risks associated with BGP in light of the risk of consumer harm posed by unsecured Internet routing and explore effective security practices to mitigate these vulnerabilities.
Cybersecurity Risk: Your Business is a Target
Join cybersecurity expert Tim Dubman in a non-technical discussion of cybersecurity business risks. Best practices will be explored including how relying on cyber insurance can fail.
Topics will include:
- Introduction to Cybersecurity Risks: Discuss the current state of cyber threats and their impact on businesses.
- The Human Factor in Cybersecurity: Explore the role of employees in creating and preventing cybersecurity risks.
- Best Practices for Cybersecurity: Cover key steps organizations can take to minimize their risk of a cyber-attack.
- The Limitations of Cyber Insurance: Examine the limitations of relying solely on cyber insurance as a solution to cybersecurity risk.
- Real-World Cybersecurity Incidents: Discuss real-world examples of successful and unsuccessful cyber-attacks to illustrate the importance of proper cybersecurity measures.
- Building a Cybersecurity Culture: Discuss the importance of building a cybersecurity culture within an organization and provide tips for doing so.
- Q&A Session: Attendees will be able to ask questions and engage in a discussion with cybersecurity expert Tim Dubman.
Presenter's Bio: Tim Dubman is a seasoned cybersecurity expert with over 30 years of focused experience. He is the founder of Dubman Group and CISO Sidekick, where he serves as a virtual Chief Information Security Officer (vCISO) and cybersecurity awareness trainer. With a background as a CISO in corporate environments, he has successfully protected both small and large organizations worldwide. His unique perspective, having worked as a "hacker-for-hire" in the past, allows him to understand the tactics of bad actors and better defend organizations. Tim is passionate about sharing his knowledge and helping organizations strengthen their defenses against cyber-attacks, while also reducing the stress faced by cybersecurity professionals. As a Carnegie Mellon-trained expert, he is highly qualified to lead the charge in keeping your organization secure.
Let’s Talk About the Human Factor in Cybersecurity
Join us as we discuss tips and tricks on how to address insider threats and social engineering!
Speaker: Quiana Gainey, Virginia SBDC Cyber Industry Expert
Cyber Security Post Pandemic for Small Business and Home
Post Covid-19 Small Businesses and Startups are challenged with the challenge of providing a secure and high performance work space for all collaborators.
2023 Small Business Cyber Issues Include:
1. Retooling for remote work created new vulnerabilities
2. Ransomware is more prevalent than before the pandemic
3. IoT and the supply chain has experienced new levels of cyber attacks
4. Expansion of cloud services increases complexity and depth of cyber attacks
5. Mobile computing and wearable’s are more of a target today
6. Phishing is a popular methodology for cyber terrorists
7. Insider threats are more prevalent than ever
8. Data privacy elevated to a primary organizational objective
9. Artificial Intelligence and Expert Systems becoming as component of cyber security
10. Cyber Cold war Security Perspectives
Boot Camp: "Basic Cyber Hygiene: Options and Resources"
Join hundreds of small businesses to lean about Basic Cyber Hygiene and the methods/resources for your small business to attain Basic Cyber Hygiene. A Keynote from Tribal Government Institute APEX Accelerator. Three hours of free help to your small business so you can have confidence that you have established Basic Cyber Hygiene. Walk away understanding Basic Cyber Hygiene and implement it that day for your small business.
Brought to you by the Department of the Navy’s Blue Cyber Initiative.
Business Expert Session: Cybersecurity Awareness
Did you know?
- 9 out of 10 cyberattacks start with a phishing email.
- 43% of cyberattacks target small businesses.
- 1 in 3 small-to-mid sized businesses fall victim to a data breach.
To mitigate this ever-changing threat environment, it is important that you know where your risks really are and focus resources on continually eliminating the biggest threats.
In this session, we will discuss:
- What is a Phishing Attack?
- How to protect yourself and your business
- Insight into some popular cyber threats in today’s landscape
About the presenter:
Jonathan Wood – VCTO Secure
Driven by the goal of becoming one of the best Managed Service companies in the Seattle area, Jonathan is dedicated to providing exceptional service and solutions to our clients. Whether it’s optimizing business processes, network performance, ensuring the highest level of cybersecurity, or managing vendors and cloud service providers, Jonathan is committed to delivering results that exceed expectations.
The Opportunities and Challenges of Artificial Intelligence for Communications Networks and Consumers
The Federal Communications Commission and the National Science Foundation are co-hosting this half-day workshop that will convene stakeholders to discuss the opportunities that artificial intelligence (AI) presents for spectrum management and network resiliency, and the challenges AI brings to vital consumer issues like robocalls/robotexts and digital discrimination.
The workshop will bring together a diverse array of stakeholders—network operators and vendors; leading academics; federal agencies; and public-interest representatives—to discuss the promise and challenge of artificial intelligence in the telecommunications and technology sectors. The workshop will cover a wide range of issues, including AI’s transformative potential to optimize network traffic; improve spectrum policy and facilitate sharing; and enhance resiliency through self-healing networks. The workshop will also explore how AI will affect the fight against illegal robocalls and robotexts; efforts to foster digital equity and combat discrimination; and initiatives to bring greater transparency and affordability to broadband access.
The workshop will begin with opening remarks by Chairwoman Jessica Rosenworcel, NSF Director Dr. Sethuraman Panchanathan, and Commissioner Nathan Simington. Dr. Margaret Martonosi, Assistant Director for Computer and Information Science and Engineering (CISE) at NSF, will provide the keynote speech, followed by two panels: (1) “AI’s Dramatic Impact on Communications Networks and Technologies”; and (2) “AI as a Tool and Challenge for Consumer Empowerment”. See the Public Notice for the agenda.
Introduction to Network Diagramming (IR107)
CISA is proud to offer the cybersecurity awareness webinar, Introduction to Network Diagramming on Tuesday, July 11, 2023 from 11 a.m. to noon EDT. We are excited to share this information with stakeholders across the Federal enterprise and nationally.
The target audience for this webinar are non-technical and beginning incident responders.
To protect the confidentiality, integrity, and availability of an agency’s network and the data contained therein, cybersecurity professionals must be able to identify their network enterprise accurately and completely. Network diagrams are essential and serve to help visualize what is on the network, how the overall network is structured, and how all the devices on the network are connected. Every organization should build and maintain current and accurate network diagrams to help manage their network architecture and ultimately determine how to best mitigate potential or realized risks and vulnerabilities.
This webinar includes the following information and more:
• Importance of Network Diagrams: Students will learn the
importance of creating and maintaining network topology
diagrams. Students will also understand the importance of
identifying data flows and storage, identifying remote access
points and external connections, and network segmentation for
• Key Guidance for Organizations: CISA provides guidance on
what to include in network diagrams.
• Knowledge check: The course concludes with a brief knowledge
check section to reinforce key concepts and takeaways.
• Date: Tuesday, July 11, 2023
• Time: 11 a.m. - noon EDT
• Location: Online via Adobe Connect
• CPE Credit: Participants can earn 1 CPE credit for attending this
• Note: Audio is through Adobe Connect; there is no external dial-
• Closed captioning (English only) will be available during this
training event. Previously recorded webinars are available on the
CISA YouTube Channel for playback in other languages, if
If you require a reasonable accommodation to fully participate in this virtual event, please contact
Cybersecurity is a critical piece of all businesses, especially small businesses. But many people and businesses either don’t take it seriously or assume they have everything covered. Unfortunately, with things on the web constantly changing, even the best security can leave you subject to “malware”, “Phishing scams” or being “hacked”. So how can you mitigate those instances, and be aware of what may cause harm?
During this webinar, we will discuss:
- What cybersecurity is
- Why cybersecurity is important for small businesses
- Types of cyber attacks
- Ways to protect your company
We will also have an SBA representative from the Sacramento SBA District Office provide a brief update of what the SBA is, what resources they have and the latest business information.
9:00am - SBA introduction
9:10am - Cyber Security - Zack Barton
10:20am - Q&A.
Instructor: Zack Barton, SBDC advisor
Zack has over 19 years of professional experience working with businesses small and large.
Introduction to Log Management (IR110)
CISA is proud to offer the cybersecurity awareness webinar, Introduction to Log Management on Friday, July 7, 2023 from 11 a.m. to noon EDT. We are excited to share this information with stakeholders across the Federal enterprise and nationally.
The target audience for this webinar is non-technical and beginning incident responders.
Log files provide the data that are the bread and butter of incident response, enabling network analysts and incident responders to investigate and diagnose issues and suspicious activity from network perimeter to epicenter. This webinar introduces the fundamentals of investigating logs for incidents.
This webinar includes the following information and more:
- Common attack methods: Understand log analysis, and its importance as a crucial component of incident response and network security.
- Key guidance for organizations: Introduce resources and tools that enable organizations and individuals to use log analysis to query for threat activity including SIEM, FPCAP analysis, and using PowerShell and Active Directory to run scripts.
- Case studies: Explore the methods and impacts of real-life cyberattacks, and how the victims responded and recovered.
- Knowledge check: The course concludes with a brief knowledge check section to reinforce key concepts and takeaways.
- Date: Friday, July 7, 2023
- Time: 11 a.m. - noon EDT
- Location: Online via Adobe Connect
- CPE Credit: Participants can earn 1 CPE credit for attending this course.
- Note: Audio is through Adobe Connect; there is no external dial-in. Closed captioning will be available during this training event.
If you require a reasonable accommodation to fully participate in this virtual event, please contact email@example.com at least five business days prior to the training with the type of support you need.