Let’s Talk About the Human Factor in Cybersecurity
Join us as we discuss tips and tricks on how to address insider threats and social engineering!
Speaker: Quiana Gainey, Virginia SBDC Cyber Industry Expert
Cyber Security Post Pandemic for Small Business and Home
Post Covid-19 Small Businesses and Startups are challenged with the challenge of providing a secure and high performance work space for all collaborators.
2023 Small Business Cyber Issues Include:
1. Retooling for remote work created new vulnerabilities
2. Ransomware is more prevalent than before the pandemic
3. IoT and the supply chain has experienced new levels of cyber attacks
4. Expansion of cloud services increases complexity and depth of cyber attacks
5. Mobile computing and wearable’s are more of a target today
6. Phishing is a popular methodology for cyber terrorists
7. Insider threats are more prevalent than ever
8. Data privacy elevated to a primary organizational objective
9. Artificial Intelligence and Expert Systems becoming as component of cyber security
10. Cyber Cold war Security Perspectives
Boot Camp: "Basic Cyber Hygiene: Options and Resources"
Join hundreds of small businesses to lean about Basic Cyber Hygiene and the methods/resources for your small business to attain Basic Cyber Hygiene. A Keynote from Tribal Government Institute APEX Accelerator. Three hours of free help to your small business so you can have confidence that you have established Basic Cyber Hygiene. Walk away understanding Basic Cyber Hygiene and implement it that day for your small business.
Brought to you by the Department of the Navy’s Blue Cyber Initiative.
Business Expert Session: Cybersecurity Awareness
Event description
Did you know?
- 9 out of 10 cyberattacks start with a phishing email.
- 43% of cyberattacks target small businesses.
- 1 in 3 small-to-mid sized businesses fall victim to a data breach.
To mitigate this ever-changing threat environment, it is important that you know where your risks really are and focus resources on continually eliminating the biggest threats.
In this session, we will discuss:
- What is a Phishing Attack?
- How to protect yourself and your business
- Insight into some popular cyber threats in today’s landscape
About the presenter:
Jonathan Wood – VCTO Secure
Driven by the goal of becoming one of the best Managed Service companies in the Seattle area, Jonathan is dedicated to providing exceptional service and solutions to our clients. Whether it’s optimizing business processes, network performance, ensuring the highest level of cybersecurity, or managing vendors and cloud service providers, Jonathan is committed to delivering results that exceed expectations.
Reasonable accommodations for persons with disabilities will be made if requested at least two weeks in advance. Contact WBC@businessimpactnw.org or call (206) 324-4330 x 103
The Opportunities and Challenges of Artificial Intelligence for Communications Networks and Consumers
The Federal Communications Commission and the National Science Foundation are co-hosting this half-day workshop that will convene stakeholders to discuss the opportunities that artificial intelligence (AI) presents for spectrum management and network resiliency, and the challenges AI brings to vital consumer issues like robocalls/robotexts and digital discrimination.
The workshop will bring together a diverse array of stakeholders—network operators and vendors; leading academics; federal agencies; and public-interest representatives—to discuss the promise and challenge of artificial intelligence in the telecommunications and technology sectors. The workshop will cover a wide range of issues, including AI’s transformative potential to optimize network traffic; improve spectrum policy and facilitate sharing; and enhance resiliency through self-healing networks. The workshop will also explore how AI will affect the fight against illegal robocalls and robotexts; efforts to foster digital equity and combat discrimination; and initiatives to bring greater transparency and affordability to broadband access.
The workshop will begin with opening remarks by Chairwoman Jessica Rosenworcel, NSF Director Dr. Sethuraman Panchanathan, and Commissioner Nathan Simington. Dr. Margaret Martonosi, Assistant Director for Computer and Information Science and Engineering (CISE) at NSF, will provide the keynote speech, followed by two panels: (1) “AI’s Dramatic Impact on Communications Networks and Technologies”; and (2) “AI as a Tool and Challenge for Consumer Empowerment”. See the Public Notice for the agenda.
Introduction to Network Diagramming (IR107)
CISA is proud to offer the cybersecurity awareness webinar, Introduction to Network Diagramming on Tuesday, July 11, 2023 from 11 a.m. to noon EDT. We are excited to share this information with stakeholders across the Federal enterprise and nationally.
The target audience for this webinar are non-technical and beginning incident responders.
To protect the confidentiality, integrity, and availability of an agency’s network and the data contained therein, cybersecurity professionals must be able to identify their network enterprise accurately and completely. Network diagrams are essential and serve to help visualize what is on the network, how the overall network is structured, and how all the devices on the network are connected. Every organization should build and maintain current and accurate network diagrams to help manage their network architecture and ultimately determine how to best mitigate potential or realized risks and vulnerabilities.
This webinar includes the following information and more:
• Importance of Network Diagrams: Students will learn the
importance of creating and maintaining network topology
diagrams. Students will also understand the importance of
identifying data flows and storage, identifying remote access
points and external connections, and network segmentation for
security.
• Key Guidance for Organizations: CISA provides guidance on
what to include in network diagrams.
• Knowledge check: The course concludes with a brief knowledge
check section to reinforce key concepts and takeaways.
Event Logistics:
• Date: Tuesday, July 11, 2023
• Time: 11 a.m. - noon EDT
• Location: Online via Adobe Connect
• CPE Credit: Participants can earn 1 CPE credit for attending this
course.
• Note: Audio is through Adobe Connect; there is no external dial-
in.
• Closed captioning (English only) will be available during this
training event. Previously recorded webinars are available on the
CISA YouTube Channel for playback in other languages, if
required.
If you require a reasonable accommodation to fully participate in this virtual event, please contact
Cybersecurity
Cybersecurity is a critical piece of all businesses, especially small businesses. But many people and businesses either don’t take it seriously or assume they have everything covered. Unfortunately, with things on the web constantly changing, even the best security can leave you subject to “malware”, “Phishing scams” or being “hacked”. So how can you mitigate those instances, and be aware of what may cause harm?
During this webinar, we will discuss:
- What cybersecurity is
- Why cybersecurity is important for small businesses
- Types of cyber attacks
- Ways to protect your company
We will also have an SBA representative from the Sacramento SBA District Office provide a brief update of what the SBA is, what resources they have and the latest business information.
Agenda:
9:00am - SBA introduction
9:10am - Cyber Security - Zack Barton
10:20am - Q&A.
Instructor: Zack Barton, SBDC advisor
Zack has over 19 years of professional experience working with businesses small and large.
Cost: FREE
Introduction to Log Management (IR110)
CISA is proud to offer the cybersecurity awareness webinar, Introduction to Log Management on Friday, July 7, 2023 from 11 a.m. to noon EDT. We are excited to share this information with stakeholders across the Federal enterprise and nationally.
The target audience for this webinar is non-technical and beginning incident responders.
Log files provide the data that are the bread and butter of incident response, enabling network analysts and incident responders to investigate and diagnose issues and suspicious activity from network perimeter to epicenter. This webinar introduces the fundamentals of investigating logs for incidents.
This webinar includes the following information and more:
- Common attack methods: Understand log analysis, and its importance as a crucial component of incident response and network security.
- Key guidance for organizations: Introduce resources and tools that enable organizations and individuals to use log analysis to query for threat activity including SIEM, FPCAP analysis, and using PowerShell and Active Directory to run scripts.
- Case studies: Explore the methods and impacts of real-life cyberattacks, and how the victims responded and recovered.
- Knowledge check: The course concludes with a brief knowledge check section to reinforce key concepts and takeaways.
Event Logistics:
- Date: Friday, July 7, 2023
- Time: 11 a.m. - noon EDT
- Location: Online via Adobe Connect
- CPE Credit: Participants can earn 1 CPE credit for attending this course.
- Note: Audio is through Adobe Connect; there is no external dial-in. Closed captioning will be available during this training event.
If you require a reasonable accommodation to fully participate in this virtual event, please contact cyberinsights@cisa.dhs.gov at least five business days prior to the training with the type of support you need.
Speaker Series: NCCoE Learning Series: Security Segmentation for Small Manufacturers
As manufacturers are increasingly targeted in cyberattacks, any gaps in cybersecurity leave small manufacturers vulnerable to attacks. Small manufacturers tend to operate facilities with limited staff and resources, often causing cybersecurity to fall by the wayside as something that costs too much time and money. Additionally, bringing together various cybersecurity standards, frameworks, and guides to derive a coherent action plan is a challenge even for those experienced in cybersecurity. Security segmentation is a cost effective and efficient security design approach for protecting cyber assets by grouping them based on their communication and security requirements.
Join us on June 28, 2023 from 2:00-2:45 p.m. ET where we will discuss the NCCoE’s most recent manufacturing publication, NIST Cybersecurity White Paper: Security Segmentation in a Small Manufacturing Environment. The paper outlines a practical six-step approach, incorporating the NIST Cybersecurity Framework (CSF) and NIST IR 8183 Cybersecurity Framework Manufacturing Profile (“CSF Manufacturing Profile”), that manufacturers can follow to implement security segmentation and mitigate cyber vulnerabilities in their manufacturing environments.
Join us on June 28 for a discussion where you’ll:
- meet the publication authors
- receive an overview of the new white paper with key takeaways
- have the opportunity to ask the publication authors questions
- learn how to stay involved in the NCCoE’s manufacturing-related efforts
Cybersecurity Basics for your Small Business
Technology is a double-edged sword. On the one hand, it creates productivity and business opportunities never seen before. On the other it can allow remote users access to an entire business, enabling them to take it down with a few keystrokes. Learn how to protect your small business from cyberattacks with these cybersecurity tips.
These basic tips of cybersecurity for your small business, allowing you to create robust systems and policies to protect the data of your business and its clients.