A cyberattack is one of the greatest threats facing businesses today.
Getting hacked can destroy customer trust and cost companies millions of dollars in legal fees, investigations, damage control, and lost income.
Regardless of industry, protection from these attacks must be a top priority. Too many companies underestimate this threat or simply don't know how to protect themselves until it's too late.
As a first step towards helping small businesses understand this risk, CBIA is hosting a free, member-only webinar series on cybersecurity preparedness.
Thanks to the generous sponsorship by AT&T, BlumShapiro, Keybank, and Cooperative Systems, webinar registration is free for CBIA member companies.
Part I. Your Business: One Click Away from a Cyberattack
9.20.17 | 11 am-12 noon | Watch On Demand
Small to midsize businesses are some of the most vulnerable targets for cyber attacks. Why? Because they don't think it will happen to them? Because they don't have the resources to prevent an attack?
Even if you only have one computer, you're already at risk. The good news? Taking steps to protect your business doesn't have to be expensive.
In this free, member-only webinar, discover your vulnerabilities and learn how to protect your company and customers.
Kim Bilderback is the senior director of AT&T Cybersecurity Solutions. He has over 10 years of experience on network security for organizations large and small. His team works with organizations nationwide designing and implementing AT&T security solutions in multiple environments resulting in a valuable knowledge base of threat trends and security best practices for enterprises of all sizes.
Part II. Preventing Cyberattacks
10.11.17 | 11 am-12 noon
Regardless of size or industry, your company needs cybersecurity guidelines.
This webinar gives you the blueprint for a plan that includes identifying gaps in your security, protecting your information, detecting attacks, responding to an attack, and recovering your data.
We also help you determine if your customers, subsidiaries, and vendors need to be aware of your plan.
As a partner in BlumShapiro’s consulting group, Jeff Ziplow is responsible for the firm's Risk Management and Process/Controls practices areas. He has significant experience working with organizations to assess their internal IT controls as they relate to business operations and helps to develop recommendations to mitigate risk. He oversees the firm's cybersecurity risk assessments and provides insight and guidance on developing better security practices. In addition, he works on process and control related projects to enhance operational efficiencies and provide tangible control recommendations.
Part III. Frontline Defense Against Hackers: Your Employees
10.25.17 | 11 am-12 noon
Research shows that employee education is key to protecting your business from cybersecurity threats.
Traditional threat defenses, like anti-virus and perimeter security devices, and policies all play their part, but reducing risk by addressing employee behavior is truly crucial to your business' overall security posture.
We discuss some of the signs employees should be trained to recognize to evade attacks, and how you can ensure that your people are handling sensitive information in compliant ways.
This webinar also helps you decide whether to educate employees yourself or enlist the support of a third party.
Steve Martocchio is vice president of operations at Cooperative Systems. He brings over 20 years over expertise in information technology and operations management. He has been with Cooperative Systems since 2005, and has considerable experience across the areas of backup and disaster recovery, security, and optimization and automation of networks and technical applications. He is particularly well-versed in data retention, business continuity, and cybersecurity solutions.
Part IV. How to Minimize Cyberattack Damage
11.15.17 | 11 am-12 noon
Your company has been attacked. How do you respond? Who do you notify? How much will it cost to fix the breach and recover your data? How much of your data has been exposed? Will this result in a lawsuit?
Get the answers to these common questions and more.
Part V. Evaluating Your Company’s Data Protection & Recovery Plan
12.7.17 | 11 am-12 noon
You might have out-of-the-box data encryption and firewalls in place on your office computers, but they offer a false sense of security.
In the final chapter of our cybersecurity webinar series, we cover an array of security options available and help you decide which are worth the money.