- This event has passed.
Social Engineering & Cyber Security Simplified
February 26, 2020 @ 1:00 pm - 4:30 pm
As a government contractor, you need to protect your network. Government contractors must be aware of what “Social Engineering” means to your firm’s security systems. Is your firm knowledgeable about an attack, or know how to prevent data breaches to sensitive information and defend it’s organizational vulnerabilities? This course will provide wisdom for how your firm can defend against social engineering deceptions that threaten organizational security.
• Why focus on Social Engineering
• What is Social Engineering
• Social Engineering Psychological Principles
• Social Engineering Information Gathering
• Social Engineering Attach Vectors
• Defense Against the Dark Arts
• How to Harden Your Organization
This is an interactive session so you will leave with an improved understanding and practical tips for implementation.
Cyber Security Simplified
As a government contractor you need to protect your network. You may think that cyber-attacks only happen to the corporate giants. But as a small business owner and a government contractor/vendor, you are actually at MORE RISK than them!
Nearly 60 percent of hacked small- and medium-sized businesses go out of business after six months. This course will impart wisdom for how your firm can defend against Cyber Security attacks and deceptions that threaten organizational security.
The issue of cyber security has become a central focus of companies, big and small, across all industries. As more individuals and small businesses become increasingly dependent on our networked and interconnected infrastructure, cyber-crime and cyber-criminals have become much more sophisticated in their techniques for stealing identities and using them to extract funds and make fraudulent purchases. Join us in this session to understand how your small business may be at risk, and what you can do to protect your customers and your assets.
• What is Cybersecurity?
• Who is at risk?
• Types of cyber-attacks
• Ring 1
• Ring 2
• Ring 3
• How well are you protected?