Headlines in Cybersecurity: What States Should Know - Day 5 Phishing


This event qualifies for .1 CEUs

This event qualifies for 1 CPEs

This event qualifies for .1 CLPs


The pace and impact of cyberattacks on government and critical infrastructure IT systems have accelerated over the past several years. Malware inserted into software platforms and widely distributed to customers; ransomware attacks taking down hospitals and local governments; hacks endangering water systems – all of these and many more show that our systems are under siege.

 

Join us for these five one-hour webinars spread over five days, as thought leaders from government at all levels and the contracting community focus each day on a specific aspect of the cyber threat environment and ways to more effectively respond and protect their most valuable assets – their data and IT systems.

 

Day 5: Phishing

Of all the security threats that face IT, phishing stands out because it is not an attack on the technology – it is “social engineering,” getting incautious users to click seemingly innocuous links or visit seemingly harmless websites and allowing hackers to steal user names, passwords, financial data, or other information they can use. Phishing also is one of the oldest tricks in a hacker’s book, pioneered in the mid-1990s.

 

Today, phishing is usually a “gateway crime” – hackers often use it as a way to get the credentials to gain entry into the broader IT system and launch other attacks, such as ransomware.

 

Join us as thought leaders from government and industry discuss why users continue to fall for phishing schemes, how to protect government or employee data to prevent phishing, and strategies to educate users and keep them from taking the bait.

 

Learning Objectives

  • Determine what kinds of programs or platforms can reduce the success of phishing at organizations.
  • Identify the elements of good user training and awareness programs to protect both them and the networks to which they have access.
  • Understand the strategy behind phishing attacks and the measures that can protect from their follow-up intrusions.

Speaker and Presenter Information

Speakers

 Gerald Caron
 Gerald Caron III 
 Chief Information Officer,  
 HHS OIG
 Valecia Stocchetti
 Valecia Stocchetti 
 Senior Cybersecurity Engineer,
 Center for Internet Security Controls
 Mike Watson
 Mike Watson 
 Chief Information Security Officer, 
 Commonwealth of Virginia
 Karen Worstell
 Karen Worstell 
 Senior Cybersecurity Strategist,
 VMware
 John Breeden
 John Breeden 
 Discussion Moderator &
 Contributing Editor, 
 FedInsider

 

Relevant Government Agencies

Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Office of the President (includes OMB), Dept of Agriculture, Dept of Commerce, Dept of Education, Dept of Energy, Dept of Health & Human Services, Dept of Homeland Security, Dept of Housing & Urban Development, Dept of the Interior, Dept of Justice, Dept of Labor, Dept of State, Dept of Transportation, Dept of Treasury, Dept of Veterans Affairs, EPA, GSA, USPS, SSA, NASA, Other Federal Agencies, Legislative Agencies (GAO, GPO, LOC, etc.), Judicial Branch Agencies, State Government, County Government, City Government, Municipal Government, CIA, FEMA, Office of Personnel Management, Coast Guard, National Institutes of Health, FAA, Census Bureau, USAID, National Guard Association, EEOC, Federal Government, State & Local Government, FDA, Foreign Governments/Agencies, NSA, FCC


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Fri, Oct 8, 2021, 2:00pm - 3:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Event Sponsors


Exhibitors


Organizer
FEDINSIDER


Contact Event Organizer


Join the event conversation:
@FedInsider
#cybersecurity #gov #technology


Return to search results