Contact Us   |   Sign In   |   Register
Community Search
How to Build a Cybersecurity Program
Tell a Friend About This EventTell a Friend
 

The University of Massachusetts, in partnership with Tech Collective have developed a two-hour seminar that focuses on designing, building, and maintaining a cybersecurity program. This seminar will address basic capabilities that small to mid-size businesses can take to minimize the risk of a security incident to their key computer systems and critical information assets.

5/1/2018
When: May 1, 2018
8-10 AM
Where: Tech Collective
188 Valley Street
Providence 02909
Contact: Shannon O'Donnell

« Go to Upcoming Event List  

 

The University of Massachusetts, in partnership with Tech Collective have developed a two-hour seminar that focuses on designing, building, and maintaining a cybersecurity program. This seminar will address basic capabilities that small to mid-size businesses can take to minimize the risk of a security incident to their key computer systems and critical information assets.

Seminar Outline:

  • First, we will provide an overview of digital transformation and how the innovation economy impacts businesses of all sizes. Digital transformation has become a top initiative for business and IT leaders. What should businesses do to ensure they are not left behind in the new digital world?

  • Next, we will discuss how cybersecurity impacts the new digital economy. Why it’s important for businesses of all sizes to have a comprehensive cybersecurity strategy and an effective cybersecurity program to ensure they will be successful in their digital transformation initiatives.

  • We will then discuss three key technical areas that organizations need to be address for an effective cybersecurity program:Business Applications and Information: How to identify your key business applications, understand how applications work, and how to mitigate cyber risks to critical business applications and information resources.Computer Networks: How to identify your key computer networks, understand how networks work, and how to mitigate cyber risks to computer networks.Computer Systems and Endpoints: How to identify your key computer systems and endpoints, understand how systems and endpoints work, and how to mitigate cyber risks to computer systems.

  • Finally, we will discuss key management and workforce requirements that organizations need to address to build, maintain and manage an effective cybersecurity program. Why it’s important for organizations to have the right workforce skills and abilities to effectively manage cybersecurity risks to their computer systems and information assets.


The speaker, Larry Wilson, has won severalindustry awards:

  • Security Magazine’s Most Influential People in Security, 2016
  • ISACA New England Chapter Award, 2016
  • SANS People Who Made a Difference in Cybersecurity Award, 2013
  • Information Security Executive (ISE) nominee for Executive of the Year for North America, 2013
  • Information Security Executive (ISE) North America Project Award Winner for the Academic and Public-Sector Category, 2013

For more information, contact: Shannon O'Donnell -shannon.odonnell@tech-collective.org
Tue, May 1, 2018
8 - 10 am
at Tech Collective

Did You Know?

Association Management Software Powered by YourMembership  ::  Legal