American Small Business Cybersecurity Xchange Conference

American Small Business Cybersecurity Xchange Conference
October 4th

Please join Natalia Olson-Urtecho, Regional Administrator, Mid-Atlantic Region, as she presents at The American Small Business Cybersecurity Xchange Conference on October 4, 2016.  Learn from SBA, NIST, and other government and industry experts about new regulatory, legislative, and supply chain requirements for government contractors, healthcare service providers, financial services, media, retail, tech companies, and others.  Gain perspectives from industry experts that will serve as a catalyst for reassessing your company’s security practices and elevating cybersecurity to a top five business priority.

The American Small Business Cybersecurity Xchange Conference presented by CyberRx is a one-day interactive event designed for small business executive decision-makers to:
Learn why cybersecurity is more than a technology issue

  • Understand the business, legal, and financial impacts of a cybersecurity breach
  • Hear about regulatory, legislative, and supply chain requirements and their impact
  • Learn about the NIST Cybersecurity Framework (CSF) and how it can help small businesses understand and manage cybersecurity risks
  • Discover cybersecurity tools, best practices, and resources designed for small business
  • See a live demonstration from the World’s Most Famous Hacker, Kevin Mitnick, how criminals are stealing company data and understand what needs to be done to reduce your legal liability while protecting your company’s brand and reputation.  Enter “SBA” in promotional code for discounted rate.

Source: INOVIOUS

Topics: security risks, Speaking Engagements, supply chain, financial services, cyber security, government contractors, healthcare service providers, media, regulatory & legislative requirements, SBA, retail, tech companies, CyberRx, Data Breach, American Small Business Cybersecurity Xchange Conf, Kevin Mitnick, Natalia Olson-Urtecho, NIST

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg