
Small Business Survival Guide to Cyber Security
Join us for an insightful presentation on SMB Cybersecurity, where we will dive into the key principles and practices necessary to protect your small business from cyber threats. In this session, you will learn about the evolving cybersecurity landscape, common threats facing SMBs, and practical strategies to safeguard your business against cyber-attacks. From employee training and password management to network security and compliance considerations, we will cover essential topics tailored specifically to the needs of small and medium-sized businesses. Don't miss this opportunity to fortify your business's defenses and minimize the risks of cyber incidents.
Presenter: James Elliman Founder of Elliman Technologies LLC has been working on computers since he was in 5th grade installing antivirus for his neighbors. In 2019 he launched Elliman Technologies LLC with one goal in mind to simplify IT and more importantly simplify IT for small business.
Spring Into Cybersecurity & Data Protection Awareness
Come join us for an hour of education regarding the importance of Data Protection Awareness and Cybersecurity on your business. Confidential information can be intentionally used for nefarious purposes such as scams, fraud, and cybercrime. But it can also be quite innocently and unintentionally shared due to a person’s unawareness of the sensitivity of the information.
In this cyber secure presentation we will provide actionable steps relating to what a business needs to do to protect Confidential information. We will also highlight some current threats that make your small business vulnerable. After registering, you will receive a confirmation email containing information about joining the webinar.
Speaker(s): Jacob Blacksten- Digital Solutions Manager - Delaware Small Business Development Center
Co-Sponsor(s): SBA
Fee: No Cost
FEMA’s Office of Business, Industry, and Infrastructure Integration (OB3I) March Business & Industry Call
This meeting is held to update National Business Emergency Operations Center (NBEOC) members, business and industry organizations, and FEMA partners on the initiatives and tools available during all stages of the disaster lifecycle. Each month features different topics presented by experts from FEMA, other interagency partners, and business and industry organizations. This month, we will showcase resilience tools for business organizations and communities to utilize when preparing for disaster emergencies and protecting assets throughout the year.
3:05 – 3:20 p.m. EDT: Heritage Emergency National Task Force
- Nana Kaneko, Ph.D., FEMA Office of Environmental Planning and Historic Preservation
3:20 – 3:35 p.m. EDT: Climate Risk and Resilience (ClimRR) Portal
- Quentin Cummings, FEMA National Integration Center
- Jessica Filante Farrington, AT&T
- Jordan Branham, Argonne National Laboratory
3:35 – 3:50 p.m. EDT: Government Emergency Telecommunications Services (GETS) and Wireless Priority Service (WPS)
- Colleen Wright, Emergency Communications Division, DHS Cybersecurity and Infrastructure Security Agency
3:35 – 3:50 p.m. EDT: Question & Answer
- Facilitated by Anna Taylor, Operations Readiness Branch Chief, FEMA OB3I
Intro to Cybersecurity
Empower your small business with a deep dive into cybersecurity basics at our upcoming Introduction to Cybersecurity event. Discover practical strategies to protect your business online. Join us for insights tailored to small businesses, ensuring your digital assets are secure. Do not miss out on the chance to boost your digital security knowledge.
SBA programs and services are extended to the public on a nondiscriminatory basis. For reasonable accommodation request please send an email to [email protected] at least 7 days in advance.
Navigating Cybersecurity Compliance
A helpful cybersecurity guide for small business owners!
In today's digital landscape, small businesses face an increasing number of cybersecurity threats. Navigating cybersecurity compliance can be daunting, especially for those with limited resources and expertise. This comprehensive guide provides small business owners with practical insights and actionable steps to effectively manage cybersecurity risks and ensure compliance with relevant regulations.
Whether you're a startup or an established small business, staying ahead of cybersecurity challenges is essential for protecting sensitive data, maintaining customer trust, and securing long-term success.
Supply Chain Risks and Counterintelligence
A diverse panel of Supply Chain Risk (SCR) Management subject matter experts from the Department of Justice, Office of the Director of National Intelligence, and the Office of the Under Secretary of Defense for Intelligence and Security will discuss supply chain risks with respect to counterintelligence concerns.
Defending Internet Accessible Systems (IR204)
The Cybersecurity and Infrastructure Security Agency (CISA) is proud to offer the Incident Response Training event, Defending Internet Accessible Systems Cyber Range Training (IR204), on Thursday, April 25, 2024, from 9:00 am to 1:00 pm EDT. The 200-level training events are open to government employees and contractors across federal, state, local, tribal, and territorial government, educational partners, and critical infrastructure partners. Please use your organization email address when registering.
This course is ideal for those working in cybersecurity roles who are interested in learning technical incident response skills and requires active engagement from all participants. The course assumes a mixed audience (e.g., from disparate teams and organizations) of mixed capability.
Participants will be introduced to tactics and strategies that enable them to protect their organizations from attacks against internet accessible system(s) (i.e., Internet Accessible System Attacks or IAS), through awareness of individual and organizational points of vulnerability.
Experience these benefits and more:
-
Practice in a realistic environment: Define IAS Vulnerabilities and their indicators.
-
Learn how to implement CISA guidance: Course exercises include implementation of the recommendations in BOD 19-02.
-
Identify and mitigate vulnerabilities in real time: Students will identify common methods of scanning for vulnerabilities, analyzing event logs, and modifying firewall rules.
-
Expert facilitation and peer discussion: Throughout the course, expert cybersecurity engineers will moderate discussion and conduct a recovery debrief for the exercises. Participants are also encouraged to help one another and offer relevant input to address peers' questions.
This exercise is a step-by-step, facilitated experience that uses a keyboard approach to understand these topics in a realistic technical environment.
Approved registrants must attend a mandatory student technical check the day before the training to establish a connection to the course content and lab environment.
EVENT LOGISTICS
-
Date: Thursday, April 25, 2024
-
Time: 9:00 am to 1:00 pm EDT
-
Location: Online via WebEx
-
CPE Credit: Participants can earn 4 CPE credits for attending this course.
-
Attendee Requirements: This course requires active participation. Attendees can use government-issued computers or personal computers. A second monitor is recommended.
-
Note: Audio is through WebEx; there is no external dial-in.
-
Closed captioning (English only) will be available during this training event. Previously recorded webinars are available on the CISA YouTube Channel for playback in other languages, if required.
Due to participation requirements, please register no later than 48 hours before the course starts. Cyber Insights will not accept registrations made less than 48 hours before the course start.
Coffee & Conversation with Jeanette McMillian
To mark Supply Chain Integrity Month, INSA will be hosting a virtual Coffee & Conversation with Jeanette McMillian, Assistant Director, Supply Chain and Cyber Directorate, National Counterintelligence and Security Center (NCSC), on Tuesday, April 23, from 9:00-9:45 am ET!
Moderated by INSA Executive VP John Doyon, topics for discussion include:
- Acquisition, cyber, and enterprise security
- Importance of supply chain illumination to identify and mitigate potential cyber threats to CI, such as energy, transportation, and telecommunications
- Emerging technology and supply chain challenges
- Collaborative approaches to supply chain integrity
- ...and more!
Plus, there will be ample time for audience Q&A!
Okta Gov Identity Summit
It’s a pivotal year. Federal agencies face immediate deadlines for key Zero Trust goals, while transforming digital service delivery and modernizing legacy systems. State and local governments made cybersecurity and digital services their top strategies for 2024.
What’s powering every one of these priorities? Modern Identity.
JOIN US on April 23 to learn how the public and private sectors are harnessing the power of modern Identity. We’ll cover critical topics like:
- Accomplishing immediate Zero Trust milestones and advancing maturity
- Humanizing, simplifying, and securing digital services
- Maintaining operational readiness even in hostile environments
- Understanding the power and risks of AI
Attendance is free for government but space is limited, so secure your spot today. We’re looking forward to seeing you at the Okta Gov Identity Summit!
Cyber-Attack Management: Preparation & Response
This webinar combines the key definitions of incident management and demonstrates them through real-world examples. Small businesses will learn how to determine if an event has become an incident as well as how to quickly and effectively respond to eliminate immediate threats!