
What the Hack? Cyber Threats and Your Business
The theft of digital information has become the norm in today’s society. Participants will receive key insights on the cyber threat landscape and learn best practices on how to protect their businesses from cyber-attacks. Topics that will be covered:
•Discussion of Cyber Threats
•Cybersecurity Best Practices
•Identifying & Protecting Critical Records
•Accessing Cybersecurity Tools & Resources
Software and Supply Chain Assurance Forum
The Software and Supply Chain Assurance Forum (SSCA) provides a venue for government, industry, and academic participants from around the world to share their knowledge and expertise regarding software and supply chain risks, effective practices and mitigation strategies, tools and technologies, and any gaps related to the people, processes, or technologies involved.
Hear from the C-SCRIP team at the "Securing SMBs' Supply Chains: Information Sharing Tactics Panel."
Intro to Cybersecurity
Empower your small business with a deep dive into cybersecurity basics at our upcoming Introduction to Cybersecurity event. Discover practical strategies to protect your business online. Join us for insights tailored to small businesses, ensuring your digital assets are secure. Do not miss out on the chance to boost your digital security knowledge.
This event will take place online using Microsoft Teams, please register to obtain for the login information. Please note, if you are planning to use a mobile device to access this webinar, you must first download the Teams app to your device.
SBOM-a-Rama Fall 2024
CISA is hosting another SBOM-a-Rama! We are excited for you to join us September 11-12, 2024, at the Denver Athletic Club in Denver, CO. Day 1 is the SBOM-a-Rama as you know it, a day of presentations from across the global software community on SBOM-related topics and a chance to discuss important opportunities and issues. Day 2 features our first SBOM-Solutions Showcase, where suppliers of commercial and open-source SBOM solutions will have a chance to share how they are helping meet the needs of community.
SBOM-a-Rama on Day 1 allows for both in-person and virtual attendance options. The SBOM-Solutions Showcase on Day 2 will be limited to in-person attendees. You can find the Federal Register Notice for this event here.
Digital Equity Competitive Application Webinar: Digital Equity Competitive Grant Program FAQ Webinar
This webinar is meant to provide guidance to applicants for the Digital Equity Competitive Application Grant. It will cover the latest published Frequently Asked Questions (FAQs) regarding the Digital Equity Competitive Grant Program.
If you would like to request an accommodation to participate in these office hours, please email your request to [email protected] by September 3. An NTIA staff member will follow up with you shortly regarding your request.
Using the CISA Incident Response Playbook at your Organization
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to present the Using the CISA Incident Response Playbook at your Organization (IR211) Cyber Range Training event. The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.
This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.
Produced in accordance with Executive Order 14028, “Improving the Nation’s Cybersecurity,” CISA released the Federal Government Cybersecurity Incident and Vulnerability Response Playbooks that provide federal civilian agencies with a standard set of procedures to respond to vulnerabilities and incidents impacting Federal Civilian Executive Branch (FCEB) networks. This course introduces students to the Incident Response Playbook that describes the process FCEB agencies should follow for confirmed malicious cyber activity for which a major incident has been declared or not yet been reasonably ruled out. The course will include a tabletop discussion format that follows a simulated IR event/scenario and guides students through the CISA IR checklist and IR phases. While the playbooks are intended for federal agencies, CISA encourages public and private sector partners to review them to help inform their own incident response practices.
Using AI for Business: Ethics and Cybersecurity Concerns
Many entrepreneurs are using Generative AI in their businesses. Tools such as ChatGPT can assist with writing a business plan, crafting product descriptions, or developing social media and web content, but what are the ethical and cybersecurity ramifications of using those tools? In this webinar, you’ll receive tips and guidance to keep you and your data safe online while using AI tools.
Cybersecurity and Your Small Business
In this workshop, we'll introduce the basics of online security and how it applies to your business and customers. We will talk about:
- Why cybersecurity matters for businesses of all sizes
- How to protect your business and your customers online
- What steps you can take after a potential security breach
Presented by Marial Elena Duron, Grow with Google instructor
Incident Response Triage: Initial Triage and Data Collectio
CISA is proud to offer the Initial Triage and Data Collection Cyber Range Training (IR215). We are excited to share this information with stakeholders across the federal enterprise and nationally.
This 4-hour skills development cyber range training provides best practices for strengthening detection and initial response capabilities for more effective triaging. Through case studies, presentations by expert facilitators, demonstrations, and lab exercises, participants will explore the tools and techniques necessary to identify suspicious and malicious activity in an enterprise environment.
Throughout the course participants will:
- Practice initial response tactics to an Advanced Persistent Threat (APT) including ransomware attacks, while emphasizing the importance of speed and accuracy in collecting the data from logs, systems, and network traffic.
- Utilize automated tools for initial data gathering and the manual collection of evidence.
This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.
Cybersecurity Basics for Non-Techies Series
The “Cybersecurity Basics for Non-Techies” course is designed to provide a comprehensive introduction to essential cybersecurity concepts. This course is perfect for beginners and non-technical individuals looking to enhance their online safety skills. Both online and onsite formats offer a blend of engaging PowerPoint slides, informative videos, and interactive lecture notes. Participants will learn to recognize common cyber threats such as phishing, malware, and social engineering attacks. The course includes real-life examples and case studies to illustrate the impact of cybersecurity breaches and effective prevention strategies. Practical tips on creating strong passwords, securing personal devices, and safe browsing practices are covered in detail. The course features statistics and citations from reputable sources like the Federal Trade Commission and the US Justice Department. In the onsite sessions, attendees can benefit from face-to-face interactions and live Q&A sessions with the instructor. The online version offers the flexibility to learn at your own pace, with access to all course materials for reference. By the end of the course, attendees will be equipped with the knowledge and skills to protect their personal and professional data, ensuring a safer digital experience.