SecureTheVillage
SecureTheVillage curates diverse resources across a range of cybersecurity topics. Use the search and filters below to find articles, recordings, and events related to your area of interest.
SecureTheVillage’s Information Security Management ResourceKit helps information security managers and leaders better secure their organizations by offering best practices and practical solutions for managing information risk. The Information Security Management ResourceKit includes More than 30 webinars and other how-to resources that are understandable and actionable. Links to external resources, providing a path for ongoing learning and education…
Data Breach Laws https://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx Security Breach Notification Laws – National Conference of … www.ncsl.org A majority of states have enacted security breach laws, requiring disclosure to consumers when personal information is compromised, among other requirements. Computer Crime Laws and Statistics Computer crime laws encompass a variety of actions that destroy or interfere with normal operation…
Speaker: Barbara Allen-Watkins, Senior Vice President Treasury Management, City National Bank Webinar Topics: Online Bank Fraud: $5.3 million a month of estimated losses in Los Angeles How cybercriminals get you to give away your own money The warning signals of online bank fraud Working with your bank to limit risk of online bank fraud Management controls to limit…
Summary The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader U.S. Government are providing this technical guidance to advise IT security professionals at public and private sector organizations to place an increased priority on patching the most commonly known vulnerabilities exploited by sophisticated foreign cyber actors. This alert…
Abstract This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks. The controls are flexible…
Abstract The protection of Controlled Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount importance to federal agencies and can directly impact the ability of the federal government to successfully conduct its essential missions and functions. This publication provides agencies with recommended security requirements for protecting the confidentiality of CUI when the…
In recognition of October as National Cybersecurity Awareness Month, the NICE Workforce Management subworking group has released a guidebook, “Cybersecurity is Everyone’s Job.” This has truly been a collaborative effort by the many members of our working group and reflects the hundreds of individual comments and suggestions received during the draft period. This guidebook provides things…
Abstract NIST developed this interagency report as a reference guideline about cybersecurity for small businesses. This document is intended to present the fundamentals of a small business information security program in non-technical language. Publication Date: November 2016
This publication contains comprehensive updates to the Risk Management Framework. The updates include an alignment with the constructs in the NIST Cybersecurity Framework; the integration of privacy risk management processes; an alignment with system life cycle security engineering processes; and the incorporation of supply chain risk management processes. Organizations can use the frameworks and processes…
Organizations around the world rely on the CIS Controls security best practices to improve their cyber defenses. CIS Controls Version 7.1 introduces new guidance to prioritize Controls utilization, known as CIS Implementation Groups (IGs). The IGs are a simple and accessible way to help organizations classify themselves and focus their security resources and expertise while leveraging the value of…
The Security Rule The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. The Security Rule is located at…
This is a recording of a special SecureTheVillage Leadership Council meeting on July 8th, 2020, hosted by Dr. Stan Stahl. Special Guest: Dr. Vinton Cerf, widely known as one of the “Fathers of the Internet,” made a special appearance at our July 8th meeting. The legendary Dr. Cerf provides a 3-tier syllogism for cybersecurity, the most fundamental…
This is a recording of SecureTheVillage’s Insurance Brokers Cybersecurity Roundtable on September 15th, 2020 hosted by Stan Stahl, PhD and Grant Hester. Description: Cybersecurity is a shared responsibility, meaning: everyone must play their part. From the end-user to the business owner, we all have a role to play. In this session, CISA outlines key steps that individuals and…
Topic: Technology Risk Mitigation for Bankers: Understanding Cybersecurity Risks & The Latest Regulatory Expectations Description: More than ever, banks are challenged with increasing cybersecurity risk, rapid changes in technology, and advancing regulatory expectations. Against this backdrop, bank boards and management are placing increasing reliance on internal audits and third party assessments to provide insight and unbiased…
Description: This SecureTheVillage webinar teaches ordinary computer users – fathers, mothers, their children, and their parents – what they need to do to stay safe: secure their information and protect their privacy. We discuss everything from freezing your credit to updating your router to preparing cyber-instructions for your next of kin. Speaker: Dr. Steve Krantz is the author of CyberGuardian: A…
Protect your community: take the CyberGuardian Pledge, join our email list, get invited to events.