Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Breadcrumb

  1. Home
  2. Node
  3. Made to Grow: Cybersecurity Training for Manufacturers

Made to Grow: Cybersecurity Training for Manufacturers

Description

Join us for a free virtual workshop to learn more about the federal resources available to help protect your company against cyber-attacks. The U.S. Small Business Administration (SBA), U.S. Cybersecurity & Infrastructure Security Agency (CISA), and the Naval Criminal Investigative Service (NCIS) will be on hand to provide training on Cybersecurity and Counterintelligence, specifically for manufacturers and exporters. 

Cyber and insider threats pose significant risks to organizations, networks, and critical infrastructure. Cyber threats involve malicious activities that compromise the confidentiality, integrity, and availability of systems and data, often executed by external actors but sometimes involving insiders who exploit their access. The insider threat refers to the potential for individuals with authorized access to harm their organization, either intentionally or unintentionally. These threats are significant concerns for both cybersecurity and counterintelligence.

In this training, participants will receive valuable insights from Federal agencies responsible for cybersecurity and counterintelligence initiatives. These initiatives focus on addressing advanced threat actors and managing the evolving threat landscape. Attendees will have the opportunity to engage with our presenters by asking questions and discussing concerns related to cyber and insider threats. Our presenters will share effective strategies for asset protection and threat mitigation.

Organizer
Presenter
Registration dates
-
Event dates
-
Online materials available date
Expiration Date