Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Events
  3. Past Events

Past Events

Filter by topic
June 20
Social Media Cybersecurity Best Practices

With all the opportunities social media offers so to come risks. This webinar demonstrates the importance of social media protection and how to manage the responsibilities of keeping a small business' image clean as well as protecting customers’ personal or sensitive information.

Thursday, June 20, 2024 - 17:00 (EDT)
June 20
Small Business Risk Exposures

Don’t Let Business Risks Stop Your Business!

Anticipating risks can create a competitive advantage…..

In this webinar, Lawrence Robert will help you understand the levels of risk that

can occur based on the business stage you are currently in. A smooth operation

does not happen on its own!

A well executed Business Risk Plan will help you maximize:

  • Customer Satisfaction & Retention
  • Financial Results
  • Cyber Integrity
  • Disaster Recovery
Thursday, June 20, 2024 - 12:00 (EDT)
June 19
Cybersecurity for Your Small Business

Cybersecurity is an important issue for businesses of all sizes. In this workshop, we’ll introduce the basics of online security and how it applies to your business and customers. You’ll learn ways you can identify common digital threats and steps you can take to protect your business. You’ll walk away with practical tips and tools to increase your business’ cybersecurity, as well as learn about the Google Cybersecurity Career Certificate to help your employees build skills in this space.

In this session we’ll talk about:

  • Why cybersecurity matters for businesses of all sizes
  • How to protect your business and your customers online
  • What steps you can take after a potential security breach

Meet Our Facilitator: Maria Elena Duron

Maria is a speaker for the Grow with Google partner program. She helps businesses profitably harness their personal brand, content, and referral marketing. Her wide range of clients includes hotels, restaurants, inventors, authors, and web series creators.

Maria is a guest lecturer at the University of Texas SBDC, editor-in-chief of the award winning Personal Branding Blog, and a contributing columnist for publications like Business Insider, American Business Journal, Fox Business, US News & World Report, Entrepreneur, The Huffington Post, and The Young Entrepreneurs Council. Maria was awarded the Texas Governor’s Excellence in Small Business Award and is the founder of #brandchat, a recognized online chat focused on marketing and branding. She earned her B.B.A. in marketing from Texas Tech University and graduate work at Cornell University, University of California in Davis, and University of Phoenix.

Wednesday, June 19, 2024 - 10:00 (EDT)
June 17
Intro to Cybersecurity

Empower your small business with a deep dive into cybersecurity basics at our upcoming Introduction to Cybersecurity event. Discover practical strategies to protect your business online. Join us for insights tailored to small businesses, ensuring your digital assets are secure. Do not miss out on the chance to boost your digital security knowledge.

 

SBA programs and services are extended to the public on a nondiscriminatory basis. For reasonable accommodation request please send an email to LADO@SBA.GOV at least 7 days in advance.

Monday, June 17, 2024 - 13:00 (EDT)
June 13
Cyber Threats Beyond Your Computer

We’re well aware that our desktops and laptops are targets for cybercriminals. What about all the other devices hackers might attack, like your phone, security system, smart thermostat, wireless printer, and even the Bluetooth in your car? In this webinar, you’ll learn about the vulnerabilities that exist outside of your computer and what you can do to make those devices more secure.

Presenters: Paul Johnson, Cybersecurity Program Manager; Ian Moon, Cybersecurity Program Assistant; and Jim Drever, Regional Director and staff cybersecurity expert

Thursday, June 13, 2024 - 12:00 (EDT)
June 13
Using the CISA Incident Response Playbook at your Organization (IR211)

he Cybersecurity and Infrastructure Security Agency (CISA) is proud to present the Using the CISA Incident Response Playbook at your Organization (IR211) event Thursday, June 13, 2024, from 9:00 a.m. EDT to 1:00 p.m. EDT. The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering. 

This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.   

Produced in accordance with Executive Order 14028, “Improving the Nation’s Cybersecurity,” CISA released the Federal Government Cybersecurity Incident and Vulnerability Response Playbooks that provide federal civilian agencies with a standard set of procedures to respond to vulnerabilities and incidents impacting Federal Civilian Executive Branch (FCEB) networks. This course introduces students to the Incident Response Playbook that describes the process FCEB agencies should follow for confirmed malicious cyber activity for which a major incident has been declared or not yet been reasonably ruled out. The course will include a tabletop discussion format that follows a simulated IR event/scenario and guides students through the CISA IR checklist and IR phases. While the playbooks are intended for federal agencies, CISA encourages public and private sector partners to review them to help inform their own incident response practices. 

Experience these benefits and more:

  • Key guidance for organizations: Introduce the CISA Incident Response (IR) Playbook with an overview of the IR phases, key resources, standardizing shared practices, and the Incident Response Checklist. Learn about roles, responsibilities, and the importance of communication during an incident response. 
  • Lessons learned: This course also highlights lessons learned and common missteps when implementing an IR playbook. 
  • Peer activity and discussion: A guided incident response tabletop scenario and discussion where students will be required to follow the IR process using the CISA IR checklist. The tabletop discussion will help students to better comprehend and apply critical thinking throughout the NIST/CISA IR process. 

EVENT LOGISTICS

  • Date: Thursday, June 13, 2024  
  • Time: 9:00 a.m. EDT - 1:00 p.m. EDT 
  • Location: Online via WebEx 
  • CPE Credit: Participants can earn 4 CPE credits for attending this course. 
  • Attendee Requirements: This course requires active participation. Attendees can use government-issued computers or personal computers. A second monitor is recommended. 
  • Note: Audio is through WebEx; there is no external dial-in. 
  • Closed captioning (English only) will be available during this training event. Previously recorded webinars are available on the CISA YouTube Channel for playback in other languages, if required. 

Due to participation requirements, please register no later than 48 hours before the course starts. Cyber Insights will not accept registrations made less than 48 hours before the course start. 

Tags

Thursday, June 13, 2024 - 09:00 (EDT)
June 12
What You Need to Do to Secure Your Smartphone: Top 10 Security Settings for Your Phone *Webinar* - PW

Topic: Cybersecurity

Overview of Live Webinar

What You Need to Do to Secure Your Smartphone: Top 10 Security Settings for Android and iPhone

Attention all small business owners! Do you know how to use the security settings built into your Android or iPhone? If not, this webinar is for you. In this session, we will show you how ten (10) crucial security settings can help protect your business:

  1. Protection Against Unauthorized Access: Security settings such as passcodes, biometric authentication, and pattern locks prevent unauthorized users from accessing your device and the sensitive information stored within it.
  2. Data Privacy: Security settings help safeguard your personal and sensitive data, including photos, messages, emails, and financial information, from being accessed or stolen by cybercriminals or malicious apps.
  3. Prevention of Identity Theft: By enabling security features like two-factor authentication and device encryption, you reduce the risk of identity theft and unauthorized use of your online accounts and personal information.
  4. Remote Tracking and Wiping: Some security settings, such as Find My iPhone or Find My Device for Android, allow you to remotely locate, lock, or erase your device in case it gets lost or stolen, enhancing the chances of recovering it and protecting your data.
  5. Defense Against Malware and Viruses: Certain security settings and features, such as app permissions, app store security, and automatic software updates, help protect your device from malware, viruses, and other digital threats that could compromise its security and functionality.

Using the proper security settings on your Android or iPhone is essential for safeguarding your device, personal and business data, and online identity from bad actors and unfortunate accidents.

The webinar will be presented by the following speakers:

Dr. Teresa Piliouras(Link is external) - CEO and Founder, Technical Consulting & Research, Inc.(Link is external), an IT company specializing in AI, cybersecurity, quality management, and data analytics. Dr. Piliouras is a consultant, educator, inventor, and author. She holds a BS from the University of Illinois, an MBA from Iona College, and a PhD from NYU Tandon School of Engineering.

Pui Lam (Raymond) Yu(Link is external) - Executive Vice President Engineering at Technical Consulting & Research, Inc., has over 20 years of industry experience in Cybersecurity, Software Engineering, and Systems Engineering. He received his BEEE and MSEE from Stevens Institute of Technology and Rensselaer Polytechnic Institute, respectively, and his MSCS from New York University Tandon School of Engineering.

Adithya Rajendran(Link is external) - Cybersecurity Analyst at Technical Consulting & Research, Inc. He received his Bachelor of Science in Computer Science from Baskin Engineering at UCSC, and has a strong foundation in programming, data structures, algorithms, and software engineering.

Curtis Rowe II(Link is external) - Cybersecurity Analyst Intern, Technical Consulting and Research, Inc., received his BS in Cognitive Science from the University of California, San Diego.

Co-sponsor(s) & Partner(s): Prince William County Department of Economic Development(Link is external) & Prince William Chamber of Commerce(Link is external)

Cancellation Policy: Contact us earlier than OR 72 hours (3 days) prior to event. Kindly email – help@masonsbdc.org (preferred) or call 703-261-4105 to notify the team.

Special Instruction: This live webinar will be offered on the Zoom platform. You will receive a Zoom inivitation link after the registration.
 

Fee: No Cost

Webinar (Live)

Wednesday, June 12, 2024 - 10:00 (EDT)
June 12
Innovations in ICT Supply Chain Risk Management Conference (In-Person)

The Cybersecurity and Infrastructure Security Agency (CISA) will host the first annual Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) Task Force Conference, titled Innovations in ICT Supply Chain Risk Management, on June 12 at the MITRE Corporation in McLean, VA. Speakers and panelists will include CISA Director Jen Easterly and other senior officials from CISA, as well as leaders from the national security and cyber community, Task Force members, C-suite executives, and SCRM experts. Come engage with these leaders as they discuss critical and emerging topics, technologies, and resources for mitigating and reducing risks to the global ICT supply chain. 

Wednesday, June 12, 2024 - 09:00 (EDT)
June 4
IT & Cybersecurity Essentials Part 3: Advanced Security Tools

This is Part 3 of a five part IT & Cybersecurity Essentials series. This is an online-only event.***

Is your small business ready for a cyber attack? The Indiana SBDC reports that 88% of small business owners recognize their vulnerability to cyber-attacks, yet over 50% lack a cybersecurity response plan. Ignoring this threat is no longer an option. 

This webinar series will help you understand the threats facing small businesses, security language and acronyms, security measures to take, tools available, compliance requirements, and how to prepare for a cyber attack. 

Agenda for Part 3-Advanced Security Tools:

  • Firewall and Internet usage
  • How to make a secure password and MFA
  • Securing your Wifi
  • EDR, MDR, SIEM, XDR explained
  • Q&A

Our Presenter:

Kenny McMichael has over 18 years of experience in the IT industry working with small to midsize businesses. He is currently the IT Director and HIPPA Compliance Officer for the Digestive Care Center in Newburgh, IN. Kenny is an alumni of Ivy Tech and the University of Southern Indiana, a proud father of two young children, and a lover of technology.

Resources:

The Indiana SBDC has a robust toolkit available for small business owners. Visit  https://isbdc.org/cybersecurity-resources/(Link is external) to download the Cyber Workbook and make a plan to secure your business's valuable assets.

Fifth Third Bank(Link is external) is a sponsor of the Southwest Indiana SBDC and makes programming like this possible.

Tuesday, June 4, 2024 - 17:00 (EDT)
May 23
Combating Social Engineering Attacks

Learn strategies for mitigating escalating cybersecurity threats!

As social engineering attacks continue to evolve and escalate, businesses must arm themselves with effective defense strategies. This comprehensive resource delves into the world of social engineering, offering insights into the latest tactics used by cybercriminals to manipulate employees and gain unauthorized access to sensitive information. With the right knowledge and proactive measures in place, businesses can strengthen their security posture and safeguard against the ever-growing menace of social engineering attacks.

Thursday, May 23, 2024 - 12:30 (EDT)