Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Events
  3. Past Events

Past Events

Filter by topic
April 25
Making a Business Case for Security: An ISC Best Practice Webinar

Security operates in an ever-changing world and evolving threat environment. Rapid advances in technology and the constant threat of cyber criminals are forcing the convergence of physical and cybersecurity that will require both short- and long-term investment. Security professionals must present a convincing analysis that informs the organization’s bottom line. A successful business case for security significantly increases the likelihood of receiving the necessary funding to reduce organizational risks and finance essential security functions.

Tuesday, April 25, 2023 - 14:00 (EDT)
April 19
Cybersecurity, Supply Chain Risk Management, and Providing Internet For All

This webinar will introduce cybersecurity and supply chain risk management (SCRM) and discuss how they relate the NTIA Internet For All programs. Viewers will:
• Develop a better understanding of cybersecurity and SCRM,
• Learn about proper guidelines and available resources for creating and updating cybersecurity and SCRM plans, and
• Gain awareness of appropriate next steps and additional technical assistance materials.

NTIA's Office of Internet Connectivity and Growth (OICG) is excited to co-host this webinar with NTIA’s Communications Supply Chain Risk Information Partnership (C-SCRIP) program and our partners at the National Institute of Standards and Technology (NIST).

If you would like to request an accommodation to participate in this webinar, please email your request to InternetForAll@ntia.gov. A NTIA staff member will follow up with you shortly.

Wednesday, April 19, 2023 - 15:00 (EDT)
April 13
5 Cybersecurity Strategies for Small Business in 2023

Even Small Businesses can be targeted! Learn how to protect your business from Cyber Threats.

Thursday, April 13, 2023 - 12:30 (EDT)
April 6
Defend Against Ransomware Attacks

CISA is proud to offer the cybersecurity awareness webinar, Defend Against Ransomware Attacks (IR109) on Thursday, April 6, 2023 from 11 a.m. to noon EST.  We are excited to share this information with stakeholders across the Federal enterprise and nationally.

This webinar is accessible to a non-technical audience and beginning incident responders.

Thursday, April 6, 2023 - 11:00 (EDT)
April 4
Small Business Cybersecurity Part 3: Systems

This webinar will present practical ways to protect your system’s communication and information integrity. The Systems and Communications practice will describe how to monitor, control, and protect organizational communication, give instructions on how to implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks, and talk about how to use encryption and firewalls to keep communications secure.  The System and Information Integrity practice will explain how to identify, report, and correct information and information system flaws in a timely manner. It will also discuss how you can provide protection against malicious code, why updating protection mechanisms regularly is a necessity to keep your business secure, and how to perform periodic scans of an information system as well as how to get real-time scans of files from external sources that are downloaded, opened, or executed.

Tuesday, April 4, 2023 - 10:30 (EDT)
March 30
Importance of Cybersecurity

Today’s cybercriminals pose more significant threats to the economy than ever before. Attend this live webinar to learn how threat actors operate and learn how to protect your business and employees from cyberattacks.

What you will learn:

  • Cyber Crime Statistics and Trends
  • Cyberattack Methods
  • Cyber Crime Threats and Risks
  • Cybersecurity Myths vs Facts
  • Cybersecurity Guide
  • Steps to Cyber Safety
Thursday, March 30, 2023 - 10:00 (EDT)
March 28
Cybersecurity Risk: The Session You Can't Afford to Miss

Topics will include:

  • Introduction to Cybersecurity Risks: Discuss the current state of cyber threats and their impact on businesses.
  • The Human Factor in Cybersecurity: Explore the role of employees in creating and preventing cybersecurity risks.
  • Best Practices for Cybersecurity: Cover key steps organizations can take to minimize their risk of a cyber-attack.
  • The Limitations of Cyber Insurance: Examine the limitations of relying solely on cyber insurance as a solution to cybersecurity risk.
  • Real-World Cybersecurity Incidents: Discuss real-world examples of successful and unsuccessful cyber-attacks to illustrate the importance of proper cybersecurity measures.
  • Building a Cybersecurity Culture: Discuss the importance of building a cybersecurity culture within an organization and provide tips for doing so.
  • Q&A Session: Attendees will be able to ask questions and engage in a discussion with cybersecurity expert Tim Dubman.
Tuesday, March 28, 2023 - 12:00 (EDT)
March 22
SCORE Northeast NJ: Emerging Issues in Privacy and Cybersecurity

This webinar is on a topic of importance for individuals and business owners. The discussion will include perspectives on how privacy and cybersecurity issues may affect your business today and into the future. Join us to hear from an expert who will provide insights into:

  1. Relevant privacy ad cybersecurity laws that may affect your business.
  2. How to assess cybersecurity and privacy risks to your business
  3. What business owners can do now to prevent or minimize such risks
Wednesday, March 22, 2023 - 12:00 (EDT)
March 21
Small Business Cybersecurity Part 2: Authentication

This webinar dives into identifying and authenticating system users, processes, and devices before allowing access to information systems along with how to control access to those systems. The portion on Identification and Authentication will detail how to determine if system users and processes acting on behalf of users are identified and how to identify and authenticate those users and processes. The practice on Access Control will discuss how to ensure anyone or anything attempting to access a system is identified and authorized, describe the types of transactions authorized users are permitted to execute, explain how to identify, verify and control connections to external systems, and how to control information posted or processed on publicly accessible information systems like social media accounts. 

Tuesday, March 21, 2023 - 10:30 (EDT)
March 15
SBA Women's Month Future of Business Cyber Hygiene, Jeri Prophet, Expert

The eyes of the IT world are once again focused on breaking news of a new zero-day exploit. This time it is a Russian actor trying to retrieve defense data. What will it be next? Security leaders and corporate executives should take note. Understanding what assets you have and their status is the first step to reducing the attack surface, improving cyber resilience and accelerating incident response. These are the core principals in good cyber hygiene.

Wednesday, March 15, 2023 - 10:30 (EDT)