Loading Events

« All Events

Social Engineering & Cyber Security Simplified

February 26 @ 1:00 pm - 4:30 pm

As a government contractor, you need to protect your network. Government contractors must be aware of what “Social Engineering” means to your firm’s security systems. Is your firm knowledgeable about an attack, or know how to prevent data breaches to sensitive information and defend it’s organizational vulnerabilities? This course will provide wisdom for how your firm can defend against social engineering deceptions that threaten organizational security.

Topics Covered:
• Why focus on Social Engineering
• What is Social Engineering
• Social Engineering Psychological Principles
• Social Engineering Information Gathering
• Social Engineering Attach Vectors
• Defense Against the Dark Arts
• How to Harden Your Organization

This is an interactive session so you will leave with an improved understanding and practical tips for implementation.

Cyber Security Simplified

As a government contractor you need to protect your network. You may think that cyber-attacks only happen to the corporate giants. But as a small business owner and a government contractor/vendor, you are actually at MORE RISK than them!

Nearly 60 percent of hacked small- and medium-sized businesses go out of business after six months. This course will impart wisdom for how your firm can defend against Cyber Security attacks and deceptions that threaten organizational security.

The issue of cyber security has become a central focus of companies, big and small, across all industries. As more individuals and small businesses become increasingly dependent on our networked and interconnected infrastructure, cyber-crime and cyber-criminals have become much more sophisticated in their techniques for stealing identities and using them to extract funds and make fraudulent purchases. Join us in this session to understand how your small business may be at risk, and what you can do to protect your customers and your assets.

Topics Covered:
• What is Cybersecurity?
• Who is at risk?
• Types of cyber-attacks
• Core
• Ring 1
• Ring 2
• Ring 3
• Edge
• How well are you protected?
• Resources

REGISTER

Details

Date:
February 26
Time:
1:00 pm - 4:30 pm
Event Category:

Organizer

Tom Fuller
Phone:
719-667-3855
Email:
T.fuller@coloradoptac.org

Venue

Colorado PTAC at Catalyst Campus
559 East Pikes Peak Ave., Suite 101
Colorado Springs, CO 80903 United States
+ Google Map
Phone:
(719)667-3845
Website:
www.coloradoptac.org