Cybersecurity 101: Understanding NIST SP 800-171 Compliance Requirements
Join us for an informative and engaging webinar designed to demystify the basic cybersecurity compliance requirements of the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171. This webinar is tailored for organizations and contractors working with or looking to work with the federal government.
Presenter: Nancy Brown, Executive Director, KY APEX Accelerator. NOTE: Login instructions will be sent the morning of the event.
Instrumenting the Environment to Detect Suspicious and Malicious Activity
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to present the Instrumenting the Environment to Detect Suspicious and Malicious Activity (IR214).
Attackers are becoming more sophisticated – and efficient. The time it takes an attacker to begin moving laterally once they have a foothold in the network is 79 minutes, compared to 9 hours in 2019. Security teams require exceptional network visibility to keep pace with top-level threat actors as these breakout times shrink. Triage training and tools can help incident response teams reduce the time an attacker dwells undetected within a network, mitigating attacks before threat actors can accomplish their missions.
This 4-hour skills development cyber range training provides best practices for organizations to strengthen their detection and initial response capabilities for more effective triaging. Through case studies, presentations by expert facilitators, demonstrations, and lab exercises participants will explore the tools and techniques necessary to identify suspicious and malicious activity in an enterprise environment.
Intro to Cybersecurity
Empower your small business with a deep dive into cybersecurity basics at our upcoming Introduction to Cybersecurity event. Discover practical strategies to protect your business online. Join us for insights tailored to small businesses, ensuring your digital assets are secure. Do not miss out on the chance to boost your digital security knowledge.
SBA programs and services are extended to the public on a nondiscriminatory basis. For reasonable accommodation request please send an email to LADO@SBA.GOV at least 7 days in advance.
Enhance Your Routing Security Using ARIN's Hosted RPKI
You may have heard about Resource Public Key Infrastructure (RPKI) and how it can help enhance your network security, but what is it and what is it all about? Get started with the steps to use ARIN’s Hosted RPKI service, including understanding key pairs, RPKI components, and how to create your Route Origin Authorization (ROA).
In this webinar, participants will:
- Gain a clear understanding of RPKI and its purpose
- Identify the key components of RPKI infrastructure
- Use the prescribed steps to successfully create a ROA in ARIN’s Hosted RPKI
SBA & IRS Summer Webinar Series: SBA Resource WBC/VBOC & IRS- Scams/Identity Theft
SBA: Learn about SBA’s resources, WBC & VBOC. This part of the webinar will take a deep dive into what the Women’s Business Center (WBC) and the Veteran Business Outreach Center (VBOC) help entrepreneurs and small businesses.
IRS: Protecting Your Business Against Scams and Identity Theft
Cyberthreats are on the rise and businesses should be vigilant about protecting their identity and the identities of their clients and employees. During this workshop we will discuss:
- How to identify scams
- Common scams
- How to report data loss due to scams
- How to report business identity theft
- ID theft resources available for business owners
- And more
FEMA’s July Business & Industry Call
FEMA’s Office of Business, Industry, and Infrastructure Integration (OB3I) announces the July Business & Industry Call
July 23, 2024, at 3:00 p.m. EDT
Please register by clicking the link below:
FEMA Zoom Webinar(Link is external)
This meeting is held to update National Business Emergency Operations Center (NBEOC) members, business and industry organizations, and FEMA partners on the initiatives and tools available during all stages of the disaster lifecycle. Each month features different topics presented by experts from FEMA, other interagency partners, and business and industry organizations.
This month, we will focus on securing businesses from natural and cyber threats, to provide business and industry partners with actionable insights for preparedness, response, and recovery efforts.
3:00 – 3:10 p.m. | Opening Remarks
- 3:10 – 3:20 p.m. | Ronald Robbins, Operations Branch Chief (A), FEMA’s Office of Business, Industry, and Infrastructure Integration (OB3I)
- 3:20 – 3:35 p.m. | Bob Nadeau, Partnerships Branch Chief, Stakeholder Engagement Division (SED), Cybersecurity & Infrastructure Security Agency (CISA)
- 3:35 – 3:50 p.m. | Denver Applehans, FEMA’s Office of External Affairs
- Overview of the National Business Emergency Operations Center (NBEOC), including the resources and real-time insights available to businesses before, during, and after a disaster.
- Overview of CISA’s Cybersecurity Awareness Program Secure Our World and opportunities to get involved in Cybersecurity Awareness Month.
- Overview of the actionable resources and tools available to businesses on Ready.gov/business
- 3:50 – 4:00 p.m. | Question & Answer
- Facilitated by Anna Taylor, Operations Readiness Branch Chief, FEMA OB3I
Questions? Please email OB3I@fema.dhs.gov
The FCC's Schools and Libraries Cybersecurity Pilot Program Webinar
On Tuesday, July 23 starting at 2 p.m. EDT, the Federal Communications Commission (FCC), along with the U.S. Department of Education, will host a virtual webinar to provide additional information about the Schools and Libraries Cybersecurity Pilot Program (Pilot Program), as well as information on other federal cybersecurity resources available to schools and libraries
Eyes on Your Own Work! File Encryption Basics Online Training
Sending unencrypted files through email or sharing sites can allow hackers to access your data. Encryption is basically converting text and data into a scrambled mess that only those with the magic key can read. In this webinar you’ll learn some basic encryption methods that will help keep your shared data safe from the eyes of hackers.
Presenters: Paul Johnson, Cybersecurity Program Manager; Jim Drever, Regional Director and staff cybersecurity expert
Cyber Security Post Pandemic for Small Business and Home
Post Covid-19 Small Businesses and Startups are challenged with the challenge of providing a secure and high performance work space for all collaborators.
2023 Small Business Cyber Issues Include:
1. Retooling for remote work created new vulnerabilities
2. Ransomware is more prevalent than before the pandemic
3. IoT and the supply chain has experienced new levels of cyber attacks
4. Expansion of cloud services increases complexity and depth of cyber attacks
5. Mobile computing and wearable’s are more of a target today
6. Phishing is a popular methodology for cyber terrorists
7. Insider threats are more prevalent than ever
8. Data privacy elevated to a primary organizational objective
9. Artificial Intelligence and Expert Systems becoming as component of cyber security
10. Cyber Cold war Security Perspectives
IT & Cybersecurity Essentials Part 5: Responding to Cyber Incidents
Is your small business ready for a cyber attack? The Indiana SBDC reports that 88% of small business owners recognize their vulnerability to cyber-attacks, yet over 50% lack a cybersecurity response plan. Ignoring this threat is no longer an option.
This webinar series will help you understand the threats facing small businesses, security language and acronyms, security measures to take, tools available, compliance requirements, and how to prepare for a cyber attack.
Agenda for Part 5-Responding to Cyber Incidents:
- How to recognize an incident
- Response plans
- Learning from the incident
- Q&A