DAF CISO's Blue Cyber "Keep Safe! Ransomware Protection Strategies!
DAF CISO's Blue Cyber "Keep Safe! Ransomware Protection Strategies! Let's get you the information and training you need to protect your U.S. Small Business from ransomware!
With a Keynote from HBCU Leader: Dr. Tim Akers!
Tuesday November 14 “Can you spot a Phish?” Information you need to protect your U.S. Small Business from social engineering! A kickoff from co-host the Cattaraugus (NY) APEX Accelerator
Hear from NIST about how to keep your U.S. Small Business on the forefront of social engineering protections. Learn the methods/resources for your small business to manage this key risk to U.S. Small Business. CISA and other source help for your small business so you can have confidence that you have established robust defenses against falling victim to Phishing attacks. Phishing is the #1 way that you are targeted by cyber criminals and is vital you protect your U.S. Small Business. Walk away understanding how social engineering works, where to get training for your employees and what defenses constitute best practices for your defense. Free Open to the Public.
Live Q&A: Small Business Cybersecurity 101: Threats, Solutions & Best Practices
Cybersecurity for Small Business: Preparing for when you actually get hacked
While the internet has made the process of reaching out to customers increasingly easy for businesses, it has exposed business sensitive data and systems to hackers seeking to exploit loopholes.
There is a common mindset among small and medium sized businesses that "I really shouldn't worry, I'm such a small target." This mindset as well as the ease of automation has made it increasingly easy for hackers to target small and medium-sized businesses because of poor security practices. Hackers consider these businesses as "easy pickings" because they are more easily compromised and are less likely to be discovered.
Cyber breaches can be devastating in that they can result in financial losses, reputation damage, legal liability, loss of customer and stakeholder trust, productivity losses, and even the potential for going out of business.
This webinar will discuss some of the critical steps that must be taken to safeguard your business' cyber security and the ways to implement these steps.
Cybersecurity for Small Business: Preparing for when you actually get hacked
While the internet has made the process of reaching out to customers increasingly easy for businesses, it has exposed business sensitive data and systems to hackers seeking to exploit loopholes.
There is a common mindset among small and medium sized businesses that "I really shouldn't worry, I'm such a small target." This mindset as well as the ease of automation has made it increasingly easy for hackers to target small and medium-sized businesses because of poor security practices. Hackers consider these businesses as "easy pickings" because they are more easily compromised and are less likely to be discovered.
Cyber breaches can be devastating in that they can result in financial losses, reputation damage, legal liability, loss of customer and stakeholder trust, productivity losses, and even the potential for going out of business.
This webinar will discuss some of the critical steps that must be taken to safeguard your business' cyber security and the ways to implement these steps.
Cybersecurity Awareness Workshop for Small Business
How would you deal with a breach if and when it occurs? It can happen to anyone and any size business. Learn the signs you've been hacked, what to do, as well as how to safeguard your business operations including yourself, your employees, and your customers. It's time to grasp cybersecurity, and you'll learn the simple, straightforward steps from our experienced, engaging instructor.
This training will focus on cybersecurity awareness for small businesses and will cover:
- What is cybersecurity and information security?
- Understanding and managing business risks
- Safeguarding information (NIST cybersecurity framework)
- Working safely and securely: best practices for business
- Compliance, rules, and regulations overview
Instructions:
You will receive the link zoom three days before and the day of the event, once you register.
Cybersecurity Part 1: Is Your Company Ready for Cybersecurity Compliance?
If you are doing work, or plan to do work with Department of Defense you will need be compliant to one of two Cybersecurity Maturity Model Certifications (CMMC) Levels. The CMMC framework is focused on securing your data and management information system. This webinar is the first in a series that will provide you an overview of the actions you need to take to develop a System Security Plan, the foundation for compliance.
This webinar will cover:
· What is the point of Cybersecurity
· What is the threat
· Does the CMMC Framework apply to you
· Types of information –FCI –UCI
· What will be your level in the CMMC Framework
· The role of the Cyber AB · What are the things you can do now
· Conclusion Questions and Answers
Understanding Cybersecurity
This webinar will review the fundamentals of cybersecurity and the threats and the countermeasures you can put in place to protect yourself and your organization.
We will review common threats such as malware, phishing, and social engineering, explore best practices for securing your data, and discuss web security challenges.
Attendees will learn:
-What is cybersecurity and why it is important to small businesses?
-How to recognize common threats
-Ways to protect your business
Target Audience
Any one interested in securing their data and website.
Sheila Bishop brings a wealth of experience to her role as a business consultant with SBDC. From a long career in corporate IT, she has extensive experience in balancing concurrent projects, interacting with a range of clients, and a wide-ranging technical background. Her most recent position was VP of Monitoring Services Operations at Bank of America where she worked for more than 20 years. During her tenure she managed enterprise teams to meet critical business needs. Sheila has a Bachelor of Arts in Computer Science from Temple University.
The 3 P's of Cybersecurity: Practical Protection for Small Businesses
In an age where digital threats are constantly evolving and targeting entities of all sizes, the need for cybersecurity is more critical than ever. Small businesses, often constrained by time and budget limitations, can feel overwhelmed when it comes to safeguarding their digital assets.
This session covers practical and cost-effective cybersecurity solutions in three key areas:
- Access Points: Protecting your Wi-Fi network, preventing unauthorized access, and maintaining separate profiles for administration and employees.
- Patches: Keep your systems safe by using updated operating systems and browsers, scanning for viruses without costly software, and applying the latest patches (a.k.a. updates).
- Passwords: Embrace secure password storage, learn to create strong passwords, and implement an affordable password management system.
This webinar will be presented by Josh Lyons, Professor of Aerospace Studies at Wilkes University, who holds a Masters of Science and Technology Intelligence degree with a concentration in cyber intelligence from National Intelligence University, Washington, D.C.
Cloud Service Adoption 101 - What You Need to Know
Every time you access your email, join a video conference call or back up the photos on your smartphone, you rely on cloud computing. The cloud delivers computing resources over the Internet, such as storage, software, and services, creating a complex supply chain requiring extensive security protocols. This webinar will provide an overview of cloud service adoption and make you aware of the security and privacy challenges pertinent to public cloud computing. NTIA's Office of Internet Connectivity and Growth (OICG) is excited to co-host this webinar with NTIA’s Communications Supply Chain Risk Information Partnership (C-SCRIP) program and our partners at the National Institute of Standards and Technology (NIST).
The 3 P's of Cybersecurity: Practical Protection for Small Businesses
In an age where digital threats are constantly evolving and targeting entities of all sizes, the need for cybersecurity is more critical than ever. Small businesses, often constrained by time and budget limitations, can feel overwhelmed when it comes to safeguarding their digital assets.
This session covers practical and cost-effective cybersecurity solutions in three key areas:
- Access Points: Protecting your Wi-Fi network, preventing unauthorized access, and maintaining separate profiles for administration and employees.
- Patches: Keep your systems safe by using updated operating systems and browsers, scanning for viruses without costly software, and applying the latest patches (a.k.a. updates).
- Passwords: Embrace secure password storage, learn to create strong passwords, and implement an affordable password management system.
This webinar will be presented by Josh Lyons, Professor of Aerospace Studies at Wilkes University, who holds a Masters of Science and Technology Intelligence degree with a concentration in cyber intelligence from National Intelligence University, Washington, D.C.