Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Events
  3. Past Events

Past Events

Filter by topic
April 4
Small Business Cybersecurity Part 3: Systems

This webinar will present practical ways to protect your system’s communication and information integrity. The Systems and Communications practice will describe how to monitor, control, and protect organizational communication, give instructions on how to implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks, and talk about how to use encryption and firewalls to keep communications secure.  The System and Information Integrity practice will explain how to identify, report, and correct information and information system flaws in a timely manner. It will also discuss how you can provide protection against malicious code, why updating protection mechanisms regularly is a necessity to keep your business secure, and how to perform periodic scans of an information system as well as how to get real-time scans of files from external sources that are downloaded, opened, or executed.

Tuesday, April 4, 2023 - 10:30 (EDT)
March 30
Importance of Cybersecurity

Today’s cybercriminals pose more significant threats to the economy than ever before. Attend this live webinar to learn how threat actors operate and learn how to protect your business and employees from cyberattacks.

What you will learn:

  • Cyber Crime Statistics and Trends
  • Cyberattack Methods
  • Cyber Crime Threats and Risks
  • Cybersecurity Myths vs Facts
  • Cybersecurity Guide
  • Steps to Cyber Safety
Thursday, March 30, 2023 - 10:00 (EDT)
March 28
Cybersecurity Risk: The Session You Can't Afford to Miss

Topics will include:

  • Introduction to Cybersecurity Risks: Discuss the current state of cyber threats and their impact on businesses.
  • The Human Factor in Cybersecurity: Explore the role of employees in creating and preventing cybersecurity risks.
  • Best Practices for Cybersecurity: Cover key steps organizations can take to minimize their risk of a cyber-attack.
  • The Limitations of Cyber Insurance: Examine the limitations of relying solely on cyber insurance as a solution to cybersecurity risk.
  • Real-World Cybersecurity Incidents: Discuss real-world examples of successful and unsuccessful cyber-attacks to illustrate the importance of proper cybersecurity measures.
  • Building a Cybersecurity Culture: Discuss the importance of building a cybersecurity culture within an organization and provide tips for doing so.
  • Q&A Session: Attendees will be able to ask questions and engage in a discussion with cybersecurity expert Tim Dubman.
Tuesday, March 28, 2023 - 12:00 (EDT)
March 22
SCORE Northeast NJ: Emerging Issues in Privacy and Cybersecurity

This webinar is on a topic of importance for individuals and business owners. The discussion will include perspectives on how privacy and cybersecurity issues may affect your business today and into the future. Join us to hear from an expert who will provide insights into:

  1. Relevant privacy ad cybersecurity laws that may affect your business.
  2. How to assess cybersecurity and privacy risks to your business
  3. What business owners can do now to prevent or minimize such risks
Wednesday, March 22, 2023 - 12:00 (EDT)
March 21
Small Business Cybersecurity Part 2: Authentication

This webinar dives into identifying and authenticating system users, processes, and devices before allowing access to information systems along with how to control access to those systems. The portion on Identification and Authentication will detail how to determine if system users and processes acting on behalf of users are identified and how to identify and authenticate those users and processes. The practice on Access Control will discuss how to ensure anyone or anything attempting to access a system is identified and authorized, describe the types of transactions authorized users are permitted to execute, explain how to identify, verify and control connections to external systems, and how to control information posted or processed on publicly accessible information systems like social media accounts. 

Tuesday, March 21, 2023 - 10:30 (EDT)
March 15
SBA Women's Month Future of Business Cyber Hygiene, Jeri Prophet, Expert

The eyes of the IT world are once again focused on breaking news of a new zero-day exploit. This time it is a Russian actor trying to retrieve defense data. What will it be next? Security leaders and corporate executives should take note. Understanding what assets you have and their status is the first step to reducing the attack surface, improving cyber resilience and accelerating incident response. These are the core principals in good cyber hygiene.

Wednesday, March 15, 2023 - 10:30 (EDT)
March 9
Let’s Talk about Cybersecurity Risks and Trends for 2023

Small business leaders can expect more incidents of attack surface expansion, data security breaches, identity theft, and remote code execution attacks than in the previous year if they don’t take proactive cybersecurity measures.

Thursday, March 9, 2023 - 12:30 (EST)
March 1
Internet For All Webinar Series: Broadband Infrastructure Program 1-Year Anniversary Celebration

In February 2022, NTIA announced several Broadband Infrastructure Program (BIP) awards - the first of many Internet For All grants to be awarded throughout the next 12 months. Join NTIA leadership and BIP program staff for our BIP 1-year anniversary celebration to recognize the work of the fourteen grantees and highlight program milestones.

Wednesday, March 1, 2023 - 15:00 (EST)
March 1
Cybersecurity Basics

With the impact of the pandemic and some stores closed or partially open, more businesses are looking to bring their “shop” online. How do we protect ourselves and our companies against cyber criminals? We all know that we shouldn't email our account information to someone claiming to be a Nigerian prince. We've heard the terms "spyware", "ransomware", "hacking", "phishing", etc. But, what do we need to know to avoid these things? How can non-technical people identify attacks and how should we respond? Join Zack Barton as he discusses the basics of cybersecurity and goes over some of the details that every computer user should understand to protect themselves and their businesses.

Wednesday, March 1, 2023 - 13:00 (EST)
February 22
Journey to the NIST Cybersecurity Framework (CSF) 2.0 | In-Person Working Sessions

Register to join an in-person working session to discuss potential updates to the CSF.  At these half-day events, attendees will participate in working sessions to discuss the potential significant changes as outlined in the CSF 2.0 Concept Paper. These sessions will build on the February 15, 2023, virtual CSF 2.0 Workshop #2, as well as feedback from the 2022 NIST Request for Information (RFI) and the first CSF 2.0 workshop. Comments shared virtually at the February 15th workshop, in-person at the working sessions, or through other means will all be considered as input toward CSF 2.0.

Wednesday, February 22, 2023 - 00:00 (EST)