Show Filters
Article / Publication
Source: SecureTheVillage   

Information Security Management ResourceKit

SecureTheVillage’s Information Security Management ResourceKit helps information security managers and leaders better secure their organizations by offering best practices and practical solutions for managing information risk. The Information Security Management ResourceKit includes More than 30 webinars and other how-to resources that are understandable and actionable. Links to external resources, providing a path for ongoing learning and education…

Article / Publication
Source: SecureTheVillage   Date: 07/24/2018

Basic Cyber Laws – Reference Materials

Data Breach Laws http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx Security Breach Notification Laws – National Conference of … www.ncsl.org A majority of states have enacted security breach laws, requiring disclosure to consumers when personal information is compromised, among other requirements. Computer Crime Laws and Statistics Computer crime laws encompass a variety of actions that destroy or interfere with normal operation…

Video / Audio
Source: SecureTheVillage   Date: 04/05/2018

Online Bank Fraud – How to Avoid Being a Victim

Speaker: Barbara Allen-Watkins, Senior Vice President Treasury Management, City National Bank Webinar Topics: Online Bank Fraud: $5.3 million a month of estimated losses in Los Angeles How cybercriminals get you to give away your own money The warning signals of online bank fraud Working with your bank to limit risk of online bank fraud Management controls to limit…

Article / Publication
Source: CISA   Date: 05/12/2020

CISA: Top 10 Routinely Exploited Vulnerabilities

Summary The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. Government are providing this technical guidance to advise IT security professionals at public and private sector organizations to place an increased priority on patching the most commonly known vulnerabilities exploited by sophisticated foreign cyber actors. This alert…

Article / Publication
Source: NIST   

Security and Privacy Controls for Information Systems and Organizations (NIST 800-53r5)

Abstract This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks. The controls are flexible…

Article / Publication
Source: NIST   

Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations (NIST SP 800-171 Rev. 2)

Abstract The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully conduct its essential missions and functions. This publication provides agencies with recommended security requirements for protecting the confidentiality of CUI when the…

Article / Publication
Source: National Initiative for Cybersecurity Education   

Cybersecurity is Everyone’s Job (National Initiative for Cybersecurity Education)

In recognition of October as National Cybersecurity Awareness Month, the NICE Workforce Management subworking group has released a guidebook, “Cybersecurity is Everyone’s Job.” This has truly been a collaborative effort by the many members of our working group and reflects the hundreds of individual comments and suggestions received during the draft period. This guidebook provides things…

Article / Publication
Source: NIST Computer Security Resource Center   

Small Business Information Security: The Fundamentals (NISTIR 7621 Rev. 1)

Abstract NIST developed this interagency report as a reference guideline about cybersecurity for small businesses. This document is intended to present the fundamentals of a small business information security program in non-technical language. Publication Date: November 2016

Article / Publication
Source: NIST   

Risk Management Framework for Information Systems and Organizations (NIST 800-37r2)

This publication contains comprehensive updates to the Risk Management Framework. The updates include an alignment with the constructs in the NIST Cybersecurity Framework; the integration of privacy risk management processes; an alignment with system life cycle security engineering processes; and the incorporation of supply chain risk management processes. Organizations can use the frameworks and processes…

Article / Publication
Source: Center for Internet Security   

Download the CIS Controls® V7.1 Today

Organizations around the world rely on the CIS Controls security best practices to improve their cyber defenses. CIS Controls Version 7.1 introduces new guidance to prioritize Controls utilization, known as CIS Implementation Groups (IGs). The IGs are a simple and accessible way to help organizations classify themselves and focus their security resources and expertise while leveraging the value of…

Article / Publication
Source: Health & Human Services   

HIPAA: The Security Rule

The Security Rule The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. The Security Rule is located at…

Video / Audio
Source: SecureTheVillage   Date: 07/08/2020

Discussion with Dr. Vinton Cerf

This is a recording of a special SecureTheVillage Leadership Council meeting on July 8th, 2020, hosted by Dr. Stan Stahl. Special Guest: Dr. Vinton Cerf, widely known as one of the “Fathers of the Internet,” made a special appearance at our July 8th meeting. The legendary Dr. Cerf provides a 3-tier syllogism for cybersecurity, the most fundamental…

Video / Audio
Source: SecureTheVillage   Date: 09/15/2020

Cybersecurity Essentials for Small & Medium Businesses

This is a recording of SecureTheVillage’s Insurance Brokers Cybersecurity Roundtable on September 15th, 2020 hosted by Stan Stahl, PhD and Grant Hester. Description: Cybersecurity is a shared responsibility, meaning: everyone must play their part.  From the end-user to the business owner, we all have a role to play.  In this session, CISA outlines key steps that individuals and…

Video / Audio
Source: SecureTheVillage   Date: 03/20/2020

Technology Risk Mitigation for Bankers

Topic: Technology Risk Mitigation for Bankers: Understanding Cybersecurity Risks & The Latest Regulatory Expectations Description: More than ever, banks are challenged with increasing cybersecurity risk, rapid changes in technology, and advancing regulatory expectations. Against this backdrop, bank boards and management are placing increasing reliance on internal audits and third party assessments to provide insight and unbiased…

Video / Audio
Source: SecureTheVillage   Date: 05/14/2020

Securing Your Home & Family (Part 1)

Description: This SecureTheVillage webinar teaches ordinary computer users – fathers, mothers, their children, and their parents – what they need to do to stay safe: secure their information and protect their privacy. We discuss everything from freezing your credit to updating your router to preparing cyber-instructions for your next of kin. Speaker: Dr. Steve Krantz is the author of CyberGuardian: A…

Video / Audio
Source: SecureTheVillage   Date: 06/11/2020

Securing Your Home and Family (Part 2)

Description: This SecureTheVillage webinar teaches ordinary computer users – fathers, mothers, their children, and their parents – what they need to do to stay safe: secure their information and protect their privacy. We discuss everything from freezing your credit to updating your router to preparing cyber-instructions for your next of kin. Speaker: Dr. Steve Krantz is the author of CyberGuardian: A…

Become A CyberGuardian

Protect your community: take the CyberGuardian Pledge, join our email list, get invited to events.

Take the Pledge