Putting Together Your Cybersecurity Emergency Response Plan
Join Zack Barton and Jake Blacksten as they discuss how to create an efficient cybersecurity emergency response plan. During this webinar, they will note details such as who to contact, and in what order, and provide a checklist of important steps to take in response to a cybersecurity attack.
Preventing DNS Infrastructure Tampering
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to offer the Incident Response Training event, Preventing DNS Infrastructure Tampering Cyber Range Training (IR206) on Tuesday, August 13, 2024. The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.
This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.
DNS is one of the core foundations of the internet however, it continues to be one of the mechanisms attackers use to perform malicious activities across the globe. In this course participants will learn about various concepts associated with DNS, become familiar with DNS tools and mapping information, get introduced to common DNS tampering techniques, and gain an understanding of DNS mitigation strategies to enhance security.
Experience these benefits and more:
- Practice in a realistic environment: Analyze network and host-based artifacts and implement remediation changes for the identified vulnerabilities.
- Learn how to implement remediations: Course exercises include remediating vulnerabilities.
- Identify and mitigate vulnerabilities in real time: Students will identify DNS infrastructure tampering techniques and mitigate them.
- Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussion and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and offer relevant input to address peers' questions.
This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.
Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.
Cyber Security 101
Cyber attacks are a serious risk for any business. This webinar will increase your awareness of cyber risks involved with owning and operating a small business; and we will recommend actions that should be taken to mitigate those risks. (Duration 1 hour)
Cyber Liability - What's The Point?
Join the UTSA Small Business Development Center and Fernando Almendariz, Almendariz Insurance for this webinar.
Cyber space is full of threats that can threaten the livelihood of a business. Understanding ways to mitigate that exposure is very important to a business’s survival. This webinar takes you through an overview of common threats and discuss ways to help prevent exposure.
Webinar instructed by: Fernando Almendariz, Almendariz Insurance.
Cybersecurity 101: Understanding NIST SP 800-171 Compliance Requirements
Join us for an informative and engaging webinar designed to demystify the basic cybersecurity compliance requirements of the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171. This webinar is tailored for organizations and contractors working with or looking to work with the federal government.
Presenter: Nancy Brown, Executive Director, KY APEX Accelerator. NOTE: Login instructions will be sent the morning of the event.
Instrumenting the Environment to Detect Suspicious and Malicious Activity
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to present the Instrumenting the Environment to Detect Suspicious and Malicious Activity (IR214).
Attackers are becoming more sophisticated – and efficient. The time it takes an attacker to begin moving laterally once they have a foothold in the network is 79 minutes, compared to 9 hours in 2019. Security teams require exceptional network visibility to keep pace with top-level threat actors as these breakout times shrink. Triage training and tools can help incident response teams reduce the time an attacker dwells undetected within a network, mitigating attacks before threat actors can accomplish their missions.
This 4-hour skills development cyber range training provides best practices for organizations to strengthen their detection and initial response capabilities for more effective triaging. Through case studies, presentations by expert facilitators, demonstrations, and lab exercises participants will explore the tools and techniques necessary to identify suspicious and malicious activity in an enterprise environment.
Intro to Cybersecurity
Empower your small business with a deep dive into cybersecurity basics at our upcoming Introduction to Cybersecurity event. Discover practical strategies to protect your business online. Join us for insights tailored to small businesses, ensuring your digital assets are secure. Do not miss out on the chance to boost your digital security knowledge.
SBA programs and services are extended to the public on a nondiscriminatory basis. For reasonable accommodation request please send an email to LADO@SBA.GOV at least 7 days in advance.
Enhance Your Routing Security Using ARIN's Hosted RPKI
You may have heard about Resource Public Key Infrastructure (RPKI) and how it can help enhance your network security, but what is it and what is it all about? Get started with the steps to use ARIN’s Hosted RPKI service, including understanding key pairs, RPKI components, and how to create your Route Origin Authorization (ROA).
In this webinar, participants will:
- Gain a clear understanding of RPKI and its purpose
- Identify the key components of RPKI infrastructure
- Use the prescribed steps to successfully create a ROA in ARIN’s Hosted RPKI
SBA & IRS Summer Webinar Series: SBA Resource WBC/VBOC & IRS- Scams/Identity Theft
SBA: Learn about SBA’s resources, WBC & VBOC. This part of the webinar will take a deep dive into what the Women’s Business Center (WBC) and the Veteran Business Outreach Center (VBOC) help entrepreneurs and small businesses.
IRS: Protecting Your Business Against Scams and Identity Theft
Cyberthreats are on the rise and businesses should be vigilant about protecting their identity and the identities of their clients and employees. During this workshop we will discuss:
- How to identify scams
- Common scams
- How to report data loss due to scams
- How to report business identity theft
- ID theft resources available for business owners
- And more
FEMA’s July Business & Industry Call
FEMA’s Office of Business, Industry, and Infrastructure Integration (OB3I) announces the July Business & Industry Call
July 23, 2024, at 3:00 p.m. EDT
Please register by clicking the link below:
FEMA Zoom Webinar(Link is external)
This meeting is held to update National Business Emergency Operations Center (NBEOC) members, business and industry organizations, and FEMA partners on the initiatives and tools available during all stages of the disaster lifecycle. Each month features different topics presented by experts from FEMA, other interagency partners, and business and industry organizations.
This month, we will focus on securing businesses from natural and cyber threats, to provide business and industry partners with actionable insights for preparedness, response, and recovery efforts.
3:00 – 3:10 p.m. | Opening Remarks
- 3:10 – 3:20 p.m. | Ronald Robbins, Operations Branch Chief (A), FEMA’s Office of Business, Industry, and Infrastructure Integration (OB3I)
- 3:20 – 3:35 p.m. | Bob Nadeau, Partnerships Branch Chief, Stakeholder Engagement Division (SED), Cybersecurity & Infrastructure Security Agency (CISA)
- 3:35 – 3:50 p.m. | Denver Applehans, FEMA’s Office of External Affairs
- Overview of the National Business Emergency Operations Center (NBEOC), including the resources and real-time insights available to businesses before, during, and after a disaster.
- Overview of CISA’s Cybersecurity Awareness Program Secure Our World and opportunities to get involved in Cybersecurity Awareness Month.
- Overview of the actionable resources and tools available to businesses on Ready.gov/business
- 3:50 – 4:00 p.m. | Question & Answer
- Facilitated by Anna Taylor, Operations Readiness Branch Chief, FEMA OB3I
Questions? Please email OB3I@fema.dhs.gov