Workshop Wednesdays

Views Navigation

Event Views Navigation

Today

Medical Device Security from Start to Finish

This workshop will cover the foundational elements needed to define and guide the development of a medical device cybersecurity program including governance, leadership, risk management, contract language, program elements, life cycle maintenance operations, and monitoring and response strategies and activities. The discussion will include monitoring tools and techniques for building effective multistakeholder partnerships needed to […]

Building an Effective Detection and Response Program

Detection of cyber intrusions is one of the most under-appreciated, and vital, areas of the cybersecurity field. How do you know when you have been hacked? When the ransomware locks up your system it is pretty clear. Is that the only kind of hacking that occurs? How do you know when other types of attacks […]

Certified Cyber Security Architect (CCSA) Certification Training (Part 1 & 2)

Distinguish yourself with the CCSA credential, the gold standard in the cybersecurity space. Learn about the updates in the DoD CMMC 2.0 and the alignment with NIST standards. Examine security incident management, essential cyber policies, encryption techniques, and more. Explore best practices to establish a credible, evidence-based cyber defense program. The CCSA program provides knowledge […]

Tipping Point: Keys to Developing and Implementing a Comprehensive Violence Prevention Program

Even as other types of crime drop, violence is soaring. FBI data for 2020 show a 30 percent increase in murder, the highest year-over-year increase ever. Aggravated assault is up 12 percent. Because of this, it is critical, now more than ever, that all organizations develop and implement comprehensive violence prevention programs for their employees, […]

Penetration (Pen) Testing for Critical Infrastructure Protection: Latest Tactics, Techniques, and Tools for the New Year

DESCRIPTIONThis presentation will cover an update of some of the most powerful pen testing tools currently in use, diving deeper into mobile, RF and Ai foundations, and learn about reinforced learning used to power the little Ai Wi-Fi / Network “Swiss Army Knife” Type Tool loaded at the core with Bettercap.org open source software, running […]

Enhancing Financial Sector Security using Blockchain

This presentation will show the basic mathematics behind Blockchain. The second part will focus on cryptocurrency. The next section will look at a variety of applications of Blockchain. Finally, we will focus on how to enhance security in the financial sector using Blockchain. Learning Outcomes/Objectives Upon completion students will be able to:1. Understand Blockchain Basics.2. […]

Cyber Crisis Management: A Framework for Incident Response Maturity

An organization's ability to remain resilient during a high-severity cyber incident requires much more than world-class cyber security professionals, it requires a cross-organization and cross-functional integrated cyber crisis management capability. This session highlights an incident response maturity framework that spans from Board-level governance to technical and non-technical cyber crisis management planning, exercises, and after-action program […]

$39

Westphalia 2.0: Critical Infrastructure Protection in the New Paradigm of DAOs, NFTs and the Metaverse

GoToWebinar

This workshop examines the looming impacts to critical infrastructure brought about by the emergence of Decentralized Autonomous Organizations (DAOs) where there is no central leadership and decisions get made from the bottom-up, Web3.0, an iteration of the World Wide Web-based on blockchain, and associated technologies. The workshop will concentrate on how a new generation of […]

$39

Critical Infrastructure Protection: Why Should I Care?

GoToWebinar

Would you care if you could not use your cell phone or have access to the Internet? Would you care if you had no electricity or your car did not operate or if the trucks were all stopped and could not restock the grocery stores? In our world today these are real possibilities! We know […]

$39

Nuclear and Radiological Incident Preparedness and Protection

This presentation will provide factual information on the effects and impacts of improvised nuclear detonations and radiological incidents, with a focus on measures to protect the public. This session will cover the differences in radiological incidents and nuclear detonations, including sheltering, evacuation considerations, and how to reduce radiation casualties. Through pre-designating safe shelter areas, providing […]

Importance of log collection, analysis and retention to better secure our environments

GoToWebinar

With the highly impactful cybersecurity events of the last year (Solarwinds, Log4j, and the Windows active directory bugs) there is renewed interest in security-related logging and analysis. In this webinar, we will discuss the Aug 2021 Office of Management and Budget’s Memo (OMB 21-31) “Improving the Federal Government’s Investigative and Remediation Capabilities Related to Cybersecurity […]