SBA Cyber Security Month Cyber Basic 101
Join us for SBA Cybersecurity Month Cyber Basics 101, an event where we'll dive into definitions, prevention and corrective actions!
Unraveling Cybersecurity Myths for Small Businesses
? Strengthen your business against cyber threats. Join us to debunk common cybersecurity myths that could leave your small business vulnerable!
?? Join Michelle Schaap, NJSBDC Consultant for an enlightening session as we debunk common cybersecurity myths that often leave small businesses vulnerable, exploring the truth behind beliefs like 'I am too small to be a target' and other misconceptions surrounding cyber and privacy concerns.
? During this webinar we'll discuss:
- Cyber threats targeting small businesses.
- Financial and operational impacts of these threats.
- Legal requirements, contracts, and website statements for defense.
- Risks from third-party service providers.
- Enhancing your cybersecurity defenses with practical tips.
⚡ Don't miss this chance to gain a clear understanding of the threats your business faces and acquire actionable strategies to secure your digital presence.
➡️ Reserve your spot now to empower your business to thrive securely in today's digital landscape. ?
Cyber Security Overview
Event Description
Are you concerned about online privacy & cyber threats to your small business? If yes, then be sure to join the SBA Baltimore District Office & the MD Dept. of Commerce for a webinar outlining the Small Business Cyber Security Resilience in Maryland (SCRIM) Program. This orientation to SCRIM will cover collaboration and networking aspects of the program, utilization of resources from the program and empowerment of small businesses through the program. Presenters: SBA, MD Dept. of Commerce, Cybersecurity Association of MD (CAMI) and the MD SBDC.
CYBERSECURITY for Small Businesses
Event description
Most small business owners feel their businesses are vulnerable to a cyberattack. Yet many small businesses cannot afford professional IT solutions and don’t know where to begin. Start by learning about common cybersecurity best practices and FREE resources to address and improve your cybersecurity.
Register for our free webinar!
Speakers include:
Robert M. DelMastro, Regional Director, MA Small Business Development Center Network (MSBDC)
Susan Lourie, Business Opportunity Specialist - U.S. Small Business Administration
Stay tuned for agenda and more guest speakers...
Why cybersecurity matters!
Cyberattacks cost the U.S. economy billions of dollars a year and pose a threat for individuals and organizations. Small businesses are especially attractive targets because they have information that cybercriminals (bad actors, foreign governments, etc.) want, and they typically lack the security infrastructure of larger businesses to adequately protect their digital systems for storing, accessing, and disseminating data and information.
All SBA programs and services are offered on a nondiscriminatory basis and SBA’s participation, or support is not an endorsement of any product, service, or entity.
A TEAMS link will be sent via email prior to the webinar.
Be sure you can access TEAMS from your browser:
Cybersecurity Focus Topic: Social Engineering
Event description
What is Social Engineering?
Learn more in this informative webinar. Including examples and techniques!
Speaker: Quiana Gainey, Virginia SBDC Cyber Industry Expert
Unmasking the Threat: How Hackers Exploit AI to Target Small Business Owners *Live* - PW
Event description
Attention all small business owners!
Navigating the blurred lines between reality and deception is increasingly difficult given recent advances in Artificial Intelligence (AI). Join us for an engaging live webinar where we delve into the intricate world of cyber threats. Witness firsthand sophisticated AI tactics used by malicious actors to exploit small business owners. In this session, you will:
- Gain a Deeper Understanding: Explore real-life instances showcasing the fusion of AI and cybercrime.
- Arm Yourself with Knowledge: Discover emerging dangers that could impact your business.
- Strengthen Your Defenses: Learn effective strategies to safeguard your company against AI-fueled scams.
Who should attend: Small business owners who want to avoid being scammed by attacks targeting their company.
Small Businesses Need Big Cybersecurity
Event description
Learn the “why” for Big Cybersecurity for Small Businesses and how to…
• Execute the Defense Federal Acquisition Regulation Supplement (DFARS) requirements
• Report Cyber Incidents
• Protect Controlled Unclassified Information (CUI) – and your Intellectual Property!
• Implement the National Institute of Standards Technology Special Publication (NIST SP) 800-171
• Get Your Supplier Performance Risk System (SPRS) On!
• Share CUI when you are ready to protect it
• Get all the help available to the Defense Industrial Base (DIB) Small Business communit
Facilitator Ms. Kelley S. Kiernan, CISM, CRISC, CEH
Department of the Navy
Preventing Web and Email Server Attacks Cyber Range Training (IR205)
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to offer the Incident Response Training event, Preventing Web and Email Server Attacks Cyber Range Training (IR205), on Tuesday, September 26, 2023 from 9 a.m. to 1 p.m. EDT. The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.
This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.
Participants will be introduced to common web and email vulnerabilities, as well as the technologies of encryption and authentication to enhance web and email security. This course uses an active participation approach to facilitate realistic technical training and interaction opportunities for learners.
Experience these benefits and more:
-
Practice in a realistic environment: Analyze network and host-based artifacts and implement remediation changes for the identified vulnerabilities.
-
Learn how to implement CISA guidance: Course exercises include implementation of the recommendations in BOD 18-01.
-
Identify and mitigate vulnerabilities in real time: Students will identify common web and email vulnerabilities and mitigate them by reconfiguring the web server and DNS settings.
-
Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussion and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and address peer questions.
This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.
Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.
-
CPE Credit: Participants can earn 4 CPE credits for attending this course.
-
Attendee Requirements: This course requires active participation. Attendees can use government-issued computers or personal computers. A second monitor is recommended.
Cybersecurity Awareness – A Guide to Safeguarding Your Business
Learn tips for safe, secure, and effective remote working. This class provides information on cyber-fundamentals, best practices for protecting your data, plus an overview of the various collaborative tools you can use to empower your remote-working capabilities.
Preventing DNS Infrastructure Tampering (IR206)
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to offer the Incident Response Training event, Preventing DNS Infrastructure Tampering Cyber Range Training (IR206) on Thursday, September 21, 2023, from 9 a.m. to 1 p.m. EDT. The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.
This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.
DNS is one of the core foundations of the internet however, it continues to be one of the mechanisms attackers use to perform malicious activities across the globe. In this course participants will learn about various concepts associated with DNS, become familiar with DNS tools and mapping information, get introduced to common DNS tampering techniques, and gain an understanding of DNS mitigation strategies to enhance security.
Experience these benefits and more:
-
Practice in a realistic environment: Analyze network and host-based artifacts and implement remediation changes for the identified vulnerabilities.
-
Learn how to implement remediations: Course exercises include remediating vulnerabilities.
-
Identify and mitigate vulnerabilities in real time: Students will identify DNS infrastructure tampering techniques and mitigate them.
-
Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussion and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and offer relevant input to address peers' questions.
This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.
Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.
EVENT LOGISTICS
-
Date: Thursday, September 21, 2023
-
Time: 9 a.m. to 1 p.m. EDT
-
Location: Online via WebEx
-
CPE Credit: Participants can earn 4 CPE credits for attending this course.
-
Attendee Requirements: This course requires active participation. Attendees can use government-issued computers or personal computers. A second monitor is recommended.
-
Note: Audio is through WebEx; there is no external dial-in.
-
Closed captioning (English only) will be available during this training event. Previously recorded webinars are available on the CISA YouTube Channel for playback in other languages, if required.
Due to participation requirements, please register no later than 48 hours before the course starts. Cyber Insights will not accept registrations made less than 48 hours before the course start.