Skip to main content

CyberHawaii.org

"CyberHawaii and CISA present a new Fortify Cybersecurity Series webinar on 'Secure by Design.'"

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 10 July 2024, 0002 UTC.

Content and Source:  https://www.cyberhawaii.org.

Please check link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

 

Register Today!

CyberHawaii and the Cybersecurity and Infrastructure Security Agency (CISA) invite you to this free webinar to help you select your technology partners.

Secure by Design


Many technology products are introduced to the market even though they may have missing pieces or flaws that can be exploited by hackers. This places the burden on companies and consumers to dedicate additional resources to address these flaws and who subsequently bear the risk of them being exploited.


In more mature industries, the inclusion of security and safety principles in the design process has grown over time as manufacturers have realized that building more reliable products results in higher consumer satisfaction and less push back from regulators.


To encourage this maturation, the Cybersecurity and Infrastructure Security Agency (CISA) has come up with a voluntary program for software vendors called Secure by DesignProducts designed with Secure by Design principles prioritize the security of customers as a core business requirement, rather than merely treating it as a technical feature.


During the design phase of a product’s development lifecycle, companies should implement Secure by Design principles to significantly decrease the number of exploitable flaws before introducing them to the market for widespread use or consumption. Out-of-the-box products should have additional security features such as multi-factor authentication (MFA), logging, and single sign-on (SSO) available at no extra cost.


In this webinar you’ll learn:

 

  • What Secure by Design is and why is it important
  • How Secure by Design principles keep you safer
  • What customers and manufactures can do now

Presenter

William J. Hicks is CISA Region 9’s Cyber Outreach Support Specialist located in Oakland, CA. William holds a CompTIA Security+ certification and graduated from the Federal Cyber Defense Skilling Academy (FCDSA). William has a background in Protective Security and Risk Management and has earned a Certified Protection Professional (CPP) from ASIS.  Currently, William is studying for a second bachelor’s in computer science with a focus Secure Software Development.

Register Today!

Mahalo to our Sponsors

This session is part of the 2024 Fortify Cybersecurity Webinar Series, sponsored by

CyberHawaii and CISA. Other supporters of this series include the State Office of Homeland Security, the FBI, Chamber of Commerce Hawai‘i, the Hawai‘i Defense Alliance and the University of Hawai‘i.

CyberHawaii | www.cyberhawaii.org

Facebook  Twitter  Instagram

CyberHawaii | 2800 Woodlawn Drive, Suite 101G | Honolulu, HI 96822 US

Unsubscribe | Update Profile | Constant Contact Data Notice

Constant Contact

Comments

Popular posts from this blog

The Cyberwire Daily Briefing

"Fortinet confirms breach of customer data." Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 15 September 2024, 1339 UTC. Content and Source:   https://thecyberwire.com/newsletters/daily-briefing/13/176 Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net). V13 | Issue 176 | 9.13.24 Daily Briefing for 09.13.24 Announcement Cloud Security in the Age of Generative AI. Artificial Intelligence is revolutionizing business, but it also introduces new risks. Join us on Wednesday, September 18th at 2pm EDT for a compelling live webinar on "Good vs. Evil: Cloud Security in the Age of Generative AI" with N2K CyberWire’s Dave Bittner and Sysdig’s Loris Degioanni.  Learn more and register now . Summary By the CyberWire staff At a glance. Fortinet confirms breach of customer data. Iran's Scarred Manticore deplo...

Cyber War News Today.

"International Defence Cooperation:  A key to regional stability." Views expressed in this cybersecurity, cyber espionage, and cyber crime update are those of the reporters and correspondents.  Accessed on 15 December 2024, 0134 UTC. Content and Source:   https://cyberwar.einnews.com/news/cyber-war-news?n=2&code=FA9GNesSTpp2rjO1&utm_source=NewsletterNews&utm_medium=email&utm_campaign=Cyber+War+News&utm_content=navig Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net). Cyber War News Monitoring Get by    Email    •     RSS Published on  Dec 13, 2024 The Cyber Warfare Market Size Reach USD 127.1 Billion by 2032 Exhibiting CAGR at 13.3% WILMINGTON, DE, UNITED STATES, December 13, 2024 /⁨EINPresswire.com⁩/ -- According to the report, The Cyber Warfare Market Size Reach USD 127.1 Billion by 2032 Exhibiting CAGR at 1...

SecurityWeek Briefing

"New RAMBO attack allows air-gapped data theft." Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 10 September 2024, 0035 UTC. Content and Source:  https://www.securityweek.com Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net).   Monday, September 9 , 2024 Are you worried about unmanaged devices and apps? LATEST CYBERSECURITY HEADLINES New RAMBO Attack Allows Air-Gapped Data Theft Predator Spyware Resurfaces With Fresh Infrastructure Google Pushes Rust in Legacy Firmware to Tackle Memory Safety Flaws 300,000 Impacted by Data Breach at Car Rental Firm Avis One Million US Kaspersky Customers Transferred to Pango’s UltraAV Two Indicted in US for Running Dark Web Marketplaces Offering Stolen Information Critical SonicWall Vulnerability Possibly Exploited in Ransomware Attacks CISA Breaks Silence on Controvers...