Description: The Information Security Manager and Leadership Team have the responsibility of ensuring that the IT Infrastructure is being securely managed. This Webinar is designed to present a common set of resources the Security Manager, the … [Read more...] about Managing Security of the IT Infrastructure
CIOs, CTOs, IT Directors
Getting Cyber-Prepared: Incident Response & Business Continuity
Description: When an incident happens, you have three fundamental objectives: Getting back to work as quickly as possibleDetermining exactly what happened as thoroughly as necessaryManaging your legal exposure Topics: Incident Response … [Read more...] about Getting Cyber-Prepared: Incident Response & Business Continuity
Third-Party Security Management
Topics: The 3rd-Party Information Security Management ChallengeKey Objective: Avoid Disastrous ConsequencesThird-Party Security Management Basic RequirementsInformation Security Manager (ISM) ResponsibilitiesThe Information Risk Management … [Read more...] about Third-Party Security Management
The Cybersecurity Threat Landscape
Topics: Current and Emerging Cyber Risks: Business email compromise, Cyberfraud, Ransomware, Loss of PII, etcThreat Actors: Nation states, Cyber gangs, Political enemies, Disgruntled staff, etcWeaknesses: People, Process, Technology, 3rd-Parties, … [Read more...] about The Cybersecurity Threat Landscape
Securing the Network: Lessons Learned From Cyber Investigations
Topics: The vital importance of network visibility in responding to a cyber incident. Visibility: What it isCase Studies in Visibility: The Good. The Bad. And the Ugly.Getting VisibleTesting Your Visibility Speaker: Joe Greenfield, Managing … [Read more...] about Securing the Network: Lessons Learned From Cyber Investigations
Preparing for CMMC Certification
Description: The Cybersecurity Maturity Model Certification (CMMC) will be a requirement for defense contractors beginning in the Fall of 2020. Unlike NIST 800-171, ALL contractors will be required to achieve certification from an independent third … [Read more...] about Preparing for CMMC Certification
Cybersecurity Essentials for Small & Medium Businesses
This is a recording of SecureTheVillage's Insurance Brokers Cybersecurity Roundtable on September 15th, 2020 hosted by Stan Stahl, PhD and Grant Hester. Description: Cybersecurity is a shared responsibility, meaning: everyone must … [Read more...] about Cybersecurity Essentials for Small & Medium Businesses
Discussion with Dr. Vinton Cerf
This is a recording of a special SecureTheVillage Leadership Council meeting on July 8th, 2020, hosted by Dr. Stan Stahl. Special Guest: Dr. Vinton Cerf, widely known as one of the “Fathers of the Internet,” made a special appearance at our … [Read more...] about Discussion with Dr. Vinton Cerf
Download the CIS Controls® V7.1 Today
Organizations around the world rely on the CIS Controls security best practices to improve their cyber defenses. CIS Controls Version 7.1 introduces new guidance to prioritize Controls utilization, known as CIS Implementation … [Read more...] about Download the CIS Controls® V7.1 Today
CISA: Top 10 Routinely Exploited Vulnerabilities
Summary The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. Government are providing this technical guidance to advise IT security professionals at public and private sector … [Read more...] about CISA: Top 10 Routinely Exploited Vulnerabilities