Webinars & Workshops
(Another Membership Benefit)
Webinars & Workshops           Business Resources
 Security / Safety  (11)       * Display Webinar Titles Only *
FREE The Cyber War on Small Business
According to the 2016 State of SMB Cybersecurity report, hackers have breached half of all small businesses in the United States. Cyber threats can come in various forms including email phishing campaigns, hacking, misuse of employee privileges, and human error.
This webinar will explore who’s behind these types of breaches, tactics that are used to access systems and data, the impact of these threats on a business, and how you can defend your business against common methods of cyber attacks. (Aired on 10/25/17)
FREE Protecting Data in the Age of Ransomware
2017 was the year of Ransomware; with WannaCry & notPetya grabbing headlines around the world and instilling fear in the hearts of security professionals around the globe.
This roundtable discussion will discuss how to best protect your data so if it falls into the wrong hands, you won't end up on the front of the worlds' papers! (Aired on 9/27/17)
FREE The Second Coming of Ransomware - Insights into New Developments
We are excited to bring you an updated version of our hugely popular webinar, "Petya, notPetya or Goldeneye - The Lies, the Truth and What's Coming Next". Traditional ransomware, for the want of a better word, is boring and truthfully a fairly opportunistic way to make money. Guess what, criminal gangs don't believe in opportunistic attacks that may make them money. They want a certain assurance of success and importantly, they want big bucks.
Modern ransomware is going to be able to deliver this and more to anyone who can pay top dollar.
Join global CISO and cybersecurity expert, Amar Singh, as he shares his insights and experience on the murky world of cyber crime and ransomware and how you can be better prepared to manage this growing threat. (Aired on 9/12/17)
FREE A Tactical Guide to Reducing Your Data Breach Risk
Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.
On this webinar our panel of experts will discuss some of the best practices organizations can consider to reduce the risk of suffering from a data breach, and to proactively prepare for any subsequent breach that could happen. (Aired on 8/29/17)
FREE Cybersecurity Strategy for the C-Suite
Featuring Stuart Madnick, John Norris Maguire Professor of Information Technologies, MIT Sloan School of Management, Professor of Engineering Systems, MIT School of Engineering, and Founding Director of MIT's Interdisciplinary Consortium for Improving Critical Infrastructure Cybersecurity. (Aired on 8/3/17)
FREE How to Build Your Cybersecurity Defense
Featuring cybersecurity expert Colin McKinty, VP of Cyber Security Strategy, Americas, at BAE Systems, and author of the Harvard Business Review article “The C-Suite and IT Need to Get on the Same Page on Cybersecurity.” (Aired on 7/31/17)
FREE Orchestrating Effective IT Risk Management Across the Lines of Defense
Today’s IT risk environment is more threatened than ever thanks to the growth in sophisticated cyber attacks and security vulnerabilities. Now, complex, hard-to-detect attacks could bring down not just a single institution but also large parts of the internet and the financial markets. Organizations need an intelligent approach when it comes to assessing IT risk and managing compliance.
Staying safe is no longer just about deflecting attackers. It’s about staying ahead of attackers who are already inside the organization, and banks are doing this through structured lines of defense that enhance security capabilities, involve IT risk managers in operations, and expand internal audits mandate so they can cover business disruption.
On this webinar presentation we will address some ways how organizations can as a part of an Integrated Risk Management initiative orchestrate effective IT risk management across the lines of defense. (Aired on 8/8/17)
FREE Safeguarding Yourself Against Identity Theft and Fraudulent Tax Filings
Identity theft poses a threat to individuals, as most people are well aware. But it also presents challenges to businesses and organizations which may unwittingly be the victim of the theft of employee data.
In this SCORE LIVE Webinar, presenter Martha O'Gorman with Liberty Tax Service will look at past ID theft cases and provide tips that businesses and consumers can use to better protect their personal information. (Aired on 2/23/16)
FREE Data Breach: Protecting Your Business
During this presentation you will learn: ..... The definition of a data breach and the information that can be affected. ..... There are many more potential causes of data breach besides hackers. ..... Legal requirements of business owners for data protection. ..... Implementing cyber security best practices as a first step in protecting your data. ..... How Cyber Liability Insurance can protect your business. (Aired on 7/20/16)
FREE Quantifying Cyber Risk: A Top-down Approach
Cyber risk must be measures using a top-down approach to understand the business impact of cyber risk in dollars and cents and the effectiveness of cyber controls. Bottom-up approaches stop at the system level and do not tie the business processes to the data assets and the systems, hence they lack the ability to demonstrate the effect a missing control, or a discovered vulnerability has on cyber risk.
Bottom-Up methods have proved themselves to be extremely inaccurate as they measure controls on the technology level and only describe the control maturity and not its effectiveness. Control maturity is a term that is commonly used by IT to measure their ability to perform and is derived from IT governance methodologies such as CobIT, ITIL and CMMI models. From a Risk Management perspective, controls maturity has no effect on Risk because it only describes the implementation status of the control. For example, an Anti-Malware solution can be 90% mature because it is installed on 90% of the end-points. But from a Risk perspective, the policy this control is enforcing could be irrelevant to the Risk. So its effectiveness could be 0%.
Measuring cyber risk by evaluating controls maturity puts the insurer in a very high exposure for loss. Learn how to quantify cyber risk in dollars and cents. (Aired on 5/16/17)
FREE OSHA’s Top 10 Violations – Are you keeping your employees safe?
This webinar will cover updates to OSHA compliance including the current Top 10 violations and maximum penalties. It will highlight ways to protect yourself, your employees and your business from severe weather. You will be able to recognize and treat symptoms of heat Illness and protect yourself and your employees from heat stress. You will also learn about new safety apps for electronic devices and how they can assist with providing safety information and controlling hazards.
Key "take-aways" from the webinar: ..... OSHA's Top 10 Most Cited Violations for the recent calendar year remains largely unchanged from the prior year but maximum penalties have increased. ..... It is critical to prepare for weather emergencies and natural disasters so that you and your employees can survive them safely. ..... As the summer approaches, heat stress is a very serious hazard and providing protection for employees is essential for many employers. ..... Ways to access free mobile apps developed for electronic devices to assist individuals with safety and health information and provide tools for controlling hazards. (Aired on 5/24/17)
DISCLAIMER:   Chamber Strategies and its Chamber of Commerce partners display these webinars and on-line workshops as a good-faith educational resource for Chamber members.   This does not, in any way whatsoever, constitute an endorsement of these webinars, workshops and/or any associated websites, nor are we responsibile for their content, accuracy, legality, or any other matter so related.   Should you find that a webinar is unavailable, please let us know.   Thank you.
Copyright © 2010-2017.   Chamber Strategies.   All rights reserved.