Small Business Cybersecurity Part 3: Systems
This webinar will present practical ways to protect your system’s communication and information integrity. The Systems and Communications practice will describe how to monitor, control, and protect organizational communication, give instructions on how to implement subnetworks for publicly accessible system components that are physically or logically separated from internal networks, and talk about how to use encryption and firewalls to keep communications secure. The System and Information Integrity practice will explain how to identify, report, and correct information and information system flaws in a timely manner. It will also discuss how you can provide protection against malicious code, why updating protection mechanisms regularly is a necessity to keep your business secure, and how to perform periodic scans of an information system as well as how to get real-time scans of files from external sources that are downloaded, opened, or executed.
Importance of Cybersecurity
Today’s cybercriminals pose more significant threats to the economy than ever before. Attend this live webinar to learn how threat actors operate and learn how to protect your business and employees from cyberattacks.
What you will learn:
- Cyber Crime Statistics and Trends
- Cyberattack Methods
- Cyber Crime Threats and Risks
- Cybersecurity Myths vs Facts
- Cybersecurity Guide
- Steps to Cyber Safety
Cybersecurity Risk: The Session You Can't Afford to Miss
Topics will include:
- Introduction to Cybersecurity Risks: Discuss the current state of cyber threats and their impact on businesses.
- The Human Factor in Cybersecurity: Explore the role of employees in creating and preventing cybersecurity risks.
- Best Practices for Cybersecurity: Cover key steps organizations can take to minimize their risk of a cyber-attack.
- The Limitations of Cyber Insurance: Examine the limitations of relying solely on cyber insurance as a solution to cybersecurity risk.
- Real-World Cybersecurity Incidents: Discuss real-world examples of successful and unsuccessful cyber-attacks to illustrate the importance of proper cybersecurity measures.
- Building a Cybersecurity Culture: Discuss the importance of building a cybersecurity culture within an organization and provide tips for doing so.
- Q&A Session: Attendees will be able to ask questions and engage in a discussion with cybersecurity expert Tim Dubman.
SCORE Northeast NJ: Emerging Issues in Privacy and Cybersecurity
This webinar is on a topic of importance for individuals and business owners. The discussion will include perspectives on how privacy and cybersecurity issues may affect your business today and into the future. Join us to hear from an expert who will provide insights into:
- Relevant privacy ad cybersecurity laws that may affect your business.
- How to assess cybersecurity and privacy risks to your business
- What business owners can do now to prevent or minimize such risks
Small Business Cybersecurity Part 2: Authentication
This webinar dives into identifying and authenticating system users, processes, and devices before allowing access to information systems along with how to control access to those systems. The portion on Identification and Authentication will detail how to determine if system users and processes acting on behalf of users are identified and how to identify and authenticate those users and processes. The practice on Access Control will discuss how to ensure anyone or anything attempting to access a system is identified and authorized, describe the types of transactions authorized users are permitted to execute, explain how to identify, verify and control connections to external systems, and how to control information posted or processed on publicly accessible information systems like social media accounts.
SBA Women's Month Future of Business Cyber Hygiene, Jeri Prophet, Expert
The eyes of the IT world are once again focused on breaking news of a new zero-day exploit. This time it is a Russian actor trying to retrieve defense data. What will it be next? Security leaders and corporate executives should take note. Understanding what assets you have and their status is the first step to reducing the attack surface, improving cyber resilience and accelerating incident response. These are the core principals in good cyber hygiene.
Let’s Talk about Cybersecurity Risks and Trends for 2023
Small business leaders can expect more incidents of attack surface expansion, data security breaches, identity theft, and remote code execution attacks than in the previous year if they don’t take proactive cybersecurity measures.
Internet For All Webinar Series: Broadband Infrastructure Program 1-Year Anniversary Celebration
In February 2022, NTIA announced several Broadband Infrastructure Program (BIP) awards - the first of many Internet For All grants to be awarded throughout the next 12 months. Join NTIA leadership and BIP program staff for our BIP 1-year anniversary celebration to recognize the work of the fourteen grantees and highlight program milestones.
Cybersecurity Basics
With the impact of the pandemic and some stores closed or partially open, more businesses are looking to bring their “shop” online. How do we protect ourselves and our companies against cyber criminals? We all know that we shouldn't email our account information to someone claiming to be a Nigerian prince. We've heard the terms "spyware", "ransomware", "hacking", "phishing", etc. But, what do we need to know to avoid these things? How can non-technical people identify attacks and how should we respond? Join Zack Barton as he discusses the basics of cybersecurity and goes over some of the details that every computer user should understand to protect themselves and their businesses.
Journey to the NIST Cybersecurity Framework (CSF) 2.0 | In-Person Working Sessions
Register to join an in-person working session to discuss potential updates to the CSF. At these half-day events, attendees will participate in working sessions to discuss the potential significant changes as outlined in the CSF 2.0 Concept Paper. These sessions will build on the February 15, 2023, virtual CSF 2.0 Workshop #2, as well as feedback from the 2022 NIST Request for Information (RFI) and the first CSF 2.0 workshop. Comments shared virtually at the February 15th workshop, in-person at the working sessions, or through other means will all be considered as input toward CSF 2.0.