Cybersecurity Essentials: Toolkit for Small Businesses

cybersecurity breach

Dive into the critical digital tools that form the cybersecurity backbone for small enterprises. This session demystifies the technical jargon and focuses on practical, accessible solutions that provide robust protection without complexity.

Register




Cybersecurity Maturity Model Certification (CMMC)

Manufacturers in the DoD supply chain are required to have adequate information security measures in place to protect Controlled Unclassified Information (CUI). Starting in 2020, independent auditors will be assessing manufacturers’ security posture, which will determine which contracts they can bid. This session will provide an overview of these requirements and the various options available to ensure compliance with them.

Register




Cybersecurity Maturity Model Certification (CMMC) Training

Scott Dawson, President of Core Business Solutions, offers a training on the new Cybersecurity Maturity Model Certification (CMMC) standard for Department of Defense contractors.

This webcast is courtesy of: SEDA COG PTAC, Calu U Gaco PTAC, Slippery Rock University PTAC, IMC, SAP&DC PTAC, PA PREP, Northwest PTAC, Southeast PA PTAC, Northern Tier PTAC, IUP PTAC, Northeastern PA PTAC, JARI PTAC and North Central PTAC.

Click link below to register!

The Procurement Technical Assistance program is funded in part through a cooperative agreement with the Defense Logistics Agency.




How Industrial IoT Increases Overall Equipment Efficiency

Pactiv is the world’s largest manufacturer and distributor of food packaging and foodservice products. About a year ago, they identified some capacity constrained processes that were negatively impacting throughput and product quality. Pactiv partnered with Deloitte and PTC to begin their digital manufacturing transformation — leveraging IoT technology to align their people and processes around real-time, actionable performance data.

Join us to hear Christine Dehaven, Senior Director Digital Manufacturing, Pactiv, discuss the success of Pactiv’s Factory Asset Intelligence with Rick Burke, Specialist Leader of Supply Chain and Manufacturing, Deloitte Consulting, and Howard Heppelmann, VP & GM of Connected Solutions, PTC.

In this webinar, you will learn how Pactiv’s Factory Asset Intelligence is bringing together people, processes, and technology to:

  • Increase throughput of high-quality product
  • Move from reactive to proactive maintenance
  • Reduce downtime due to material flow failures
  • Reduce equipment failures

Speakers

Christine Dehaven 770

Christine Dehaven, Senior Director Digital Manufacturing, Pactiv, LLC

Christine DeHaven is the Sr. Director of Digital Manufacturing for Pactiv. She is responsible for guiding Pactiv’s Factory Assent Intelligence/IoT initiative across the manufacturing platforms to optimize plant performance and support business growth opportunities. Prior to transitioning into her current role, Christine was the Plant Manager for Pactiv’s pilot FAI site.

Rick Burke 770

Rick Burke, Specialist Leader of Supply Chain and Manufacturing, Deloitte Consulting

Rick helps guide customers through their Digital Supply Networks and Smart Factory journeys. He has over 25 years of experience in supply chain management primarily at the intersection of business, technology, and people. His experience includes working with companies in manufacturing industries to generate business value via technology enabled transformation programs spanning from the shop floor to the enterprise level and from product ideation through end of life.

Howard Heppelmann 770

Howard Heppelmann, VP & GM of Connected Solutions, PTC

Howard Heppelmann is Vice President and General Manager of PTC’s Connected Solutions business segment. In this role he is responsible for bringing to market solutions that harness today’s most disruptive technologies into a continuous digital thread that enables industrial companies to improve operational efficiency, differentiate products and service offerings and transform business models.

Iw Ptc Footer Deloitte 770

Register

By clicking above, I acknowledge and agree to Informa’s Terms of Service and to Informa’s use of my contact information to communicate with me about offerings by Informa, its brands, affiliates and/or third-party partners, consistent with Informa’s Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them.



Cyber Threats and Responses in the Defense Industry

CREC will host a webinar to discuss the National Defense Industry Association’s recent paper “Beyond Obfuscation: The Defense Industry’s Position within Federal Cybersecurity Policy” (https://www.ndia.org/policy/cyber/2019-cybersecurity-report). This report examines recent cyberbreaches, the evolving regulatory environment governing cybersecurity, and analyzes a survey of 300 defense suppliers and their experiences with cybersecurity. Furthermore, the report provides recommendations for government and industry based on their findings.

Join NDIA Director of Regulatory Policy Corbin Evans to learn more about the cybersecurity challenges businesses in your region face and how best to support them in addressing these threats. He will also provide an update on recent developments around the Cybersecurity Maturity Model Certification (CMMC).

Presenter:
Corbin Evans, Director of Regulatory Policy, National Defense Industrial Association

By clicking this button, you submit your information to the webinar organizer, who will use it to communicate with you regarding this event and their other services.

 Register




Data Security – How Manufacturers Can Reduce Risk and Optimize Growth

In today’s hyper-digital environment, the potential for security breaches and threats are increasing exponentially.  When successful, those breaches can be devastating to small and medium-sized businesses’ (SMBs) reputation and longevity.  However, digital cloud-based solutions offer these manufacturers built-in data security and protection measures that most companies would be hard-pressed to implement in their on-premises systems. In addition, for resource-constrained SMBs, adoption of digital technology solutions makes it possible to innovate and scale at a fast pace, allowing them to grow and be more competitive.

Join Infor and AWS security experts for a panel discussion to hear about:

  • Trends in the cybersecurity landscape
  • Balancing the need for innovation and growth while ensuring your infrastructure is secure
  • How cloud-based solutions can reduce your security risks, safeguard your data, and free your IT resources to focus on other tasks
  • What to consider when selecting a cloud solution to ensure your plan mitigates risks

Reg Banner Infor AWS.jpg
Register

By clicking above, I acknowledge and agree to Informa’s Terms of Service and to Informa’s use of my contact information to communicate with me about offerings by Informa, its brands, affiliates and/or third-party partners, consistent with Informa’s Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them.



Turbo Charge Industry 4.0 Via API Integration

In spite of the vast number of technologies involved, an Industry 4.0 transformation is about a single, fundamental strategy: connecting manufacturing business processes via application integration. Featuring details about use cases, as identified by recent research conducted by Informa/IndustryWeek, this webinar brings into focus how the various technologies — such as Data Analytics, Industrial IoT, Artificial Intelligence, Machine Learning, Advance Robotics, AR/VR, Cybersecurity, Additive Manufacturing, and Simulation—in various combinations facilitate connectivity between vital business processes to drive competitive advantage.

By understanding Industry 4.0 through this lens, business leaders will more easily identify where and how to leverage these technologies to improve every aspect of their business from sales and marketing, to product development and production, to delivery and field service.

Speakers

Patricia Panchak, President and Editor, Panchak Media, Inc.

Patricia Panchak, president and editor of Panchak Media, Inc., brings 25 years of researching world-class leadership strategies to help executives leverage the power of strategies created at the intersection of three powerful forces—digital technologies, lean management principles, and engaged employees. While each approach can be leveraged individually to create a disruptive competitive advantage, together, they become an unbeatable force. As the former editor-in-chief of IndustryWeek, Panchak is a widely recognized authority on business management and leadership issues. Through extensive research, she provides a window into the best practices of world-class organizations and provides the knowledge companies need to put the challenge of global competition in perspective. She guides companies to understand not only what’s possible but what is necessary to drive their business forward.

Shekar Hariharan, VP of Product Marketing, Jitterbit

Shekar Hariharan is the VP of Product Marketing at Jitterbit, responsible for driving company’s positioning, messaging, and content. Prior to Jitterbit, Shekar spent over 14 years at Oracle where he led various leadership roles in Quality Engineering, Solutions Management and Product Marketing. He played a pivotal role in creating various industry solutions for mid-market companies. He also played a pivotal role in creating a global ecosystem of over 140 certified partners, training them from selling and implementing pre-built solutions, which bundled ERP, CRM, Supply Chain and HCM applications, and helped customers achieve rapid time to market. He also spent a year as a Director of Product Marketing at SugarCRM prior to joining Jitterbit. Shekar holds a bachelor’s degree in Mechanical Engineering (MSRIT, India) and Master’s degree in Industrial Engineering (LSU). He also holds an Executive MBA from UCLA, Anderson School of Management.

Kerrie Jordan, Sr. Manager Product Marketing, Epicor Software

Kerrie Jordan is Sr. Manager Product Marketing at Epicor Software. She brings over a decade of experience in ERP, supply chain, eCommerce, cloud computing, and product development business solutions.


Register

By clicking above, I acknowledge and agree to Informa’s Terms of Service and to Informa’s use of my contact information to communicate with me about offerings by Informa, its brands, affiliates and/or third-party partners, consistent with Informa’s Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them.



Data Security Issues: Why it Matters for Recycling of Old, Outdated IT Equipment and e-Waste

A data security professional in cybersecurity will provide insight on how to minimize the risk of data breaches and provide proper end of lifecycle management of old IT and computer systems and other technology equipment such as printers, smart phones and tablets.

Presenter: Joe Harford, President and Founder,  Reclamere, Inc.

Register




Make Protecting Your Small Business Assets Against Cyber Threats a Goal This New Year

As you set your goals for the new year, make sure one of them is to better protect your small business from a potential cyber incident. Join NCSA and partners to learn basic strategies for protecting your business this new year. NCSA’s Director of Small Business Education will also share some “quick wins” you can implement immediately.

Register




Building a Culture of Cybersecurity Awareness for Employees in Manufacturing

Even the best information technology infrastructure won’t stop a well-meaning employee from clicking a malicious link or providing their password over the phone to someone impersonating your IT department. Cyber criminals know that manufacturing companies invest in this infrastructure, so employees are both the weakest link and best entry point to access the companies crown jewels.  Building a culture of awareness within the organization teaches employees to identify and mitigate cyber risks.  In this webinar you’ll learn how to develop a culture of cybersecurity awareness in your organization, train employees to identify cyber risks, and reduce this risk of security breaches.

Register