Webinar: 5 Steps to Reduce Your Company’s Risk of Cyber Attacks

The internet has changed the way we do business. As manufacturing become increasingly digitized, cybersecurity must become a standard part of doing business. If sensitive information – such as employee records, customer transactions or proprietary data – is compromised, it can have a devastating effect. 

In this webinar, hear how you can use the 5-step NIST Cybersecurity Framework to reduce and manage your company’s cybersecurity risk. Learn how to identify current vulnerabilities in your security, what controls you should have in place and what you need to do if you experience a cyber attack.

Primary Topics: 
1. How to identify potential security vulnerabilities, risks and threats 
2. What controls can help protect against cyber attacks 
3. What tools and resources can help detect cyber attacks 
4. How to contain, reduce damage and recover from cyber attacks 

Presenters: Patricia Toth and Jennifer Kurtz 
Patricia Toth is a Computer Scientist at NIST Manufacturing Extension Partnership. Pat serves as the Cybersecurity Program Manager and focuses on cybersecurity awareness, training and education. Pat has over 30 years of experience in Cybersecurity and has worked on various NIST Cybersecurity guidance documents. 

Jennifer Kurtz helps companies build sustainable business practices and achieve compliance with information security standards. She has taught courses in cybersecurity at Regis University; authored Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking (2016) and a chapter of The Data Breach and Encryption Handbook (2011); and she designed online cybersecurity courses for businesses and individuals.

Register




Webinar: CyberSecure My Business – How to Assess Vendor Security

Small and medium-sized businesses (SMB) regularly use outside vendors t help them manage daily business operations.

When SMBs use a vendor, how do they assess the cyber risks that come along with that? What cybersecurity considerations should SMBs use when evaluating whether or not to use a particular vendor?

Join the National Cyber Security Alliance and its partners to learn how to assess vendor security.

By joining this event, you are accepting the Cisco WebEx Terms of Service and Privacy Statement.

Register