Showing posts with label CyberHawaii. Show all posts
Showing posts with label CyberHawaii. Show all posts

Thursday, May 2, 2024

CyberHawaii

"You're Invited!  Access Management and Social Engineering Webinar."

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 02 May 2024, 2127 UTC.

Content and Source:  https://mail.google.com/mail/u/0/?tab=rm&ogbl#inbox/FMfcgzGxSvBmFxkmXjfTCZplRtmSBrQb/CyberHawaii.

Please scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

CyberHawaii, the Cybersecurity & Infrastructure Security Association, and the Federal Bureau of Investigation (FBI) present...


Access Management & Social Engineering Webinar


Tuesday, May 7, 2024

2 pm - 3 pm


Due to the sensitive nature of this presentation, this session will not be recorded and the slides will not be posted to the CyberHawaii website following the presentation.

Register today!

As a business, you want to make sure only authorized individuals have access to your company's most valuable information. This requires strong access management controls to ensure only those authorized have access to the information.


Unfortunately, hackers are expert in breaking through these controls. After they gain a foothold into your systems, hackers will not stop there. Their malware is programmed to try to access your databases, create new accounts, and move from one server to another server in your network. Hackers don't care about company size and target big and small alike.


Hackers employ social engineering techniques to persuade legitimate users to willingly give up information to gain access to systems and information that should be accessible only to authorized personnel.


Don't miss this opportunity to learn about Access Management and Social Engineering from experts from the Cybersecurity & Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI).

  

You’ll learn:

  • What Access Management is.
  • Access Management techniques and their strengths and weaknesses
  • Social Engineering techniques
  • Social Engineering scams
  • How to protect yourself and your business.

 

Presenters


Bruce Mirante, Cybersecurity State Coordinator CISA Region 9, joined the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) in January 2024.


Jasmine Lewis, FBI Special Agent, has worked for the FBI for over five years. SA Lewis works for the FBI Honolulu division Cyber Squad, focusing on cyber-criminal investigations.


Mahalo to our sponsors


This session is part of the 2024 Fortify Cybersecurity Webinar Series, sponsored by

CyberHawaii and CISA. This series was made possible by a grant from the Hawaii Department of Business, Economic Development and Tourism. Other supporters of this series include the State Office of Homeland Security, the FBI, Chamber of Commerce Hawai‘i, the Hawai‘i Defense Alliance and the University of Hawai‘i.

Register today!

CyberHawaii | www.cyberhawaii.org

Facebook  Twitter  Instagram

Thursday, April 25, 2024

CyberHawaii

"CyberHawaii Access Management and Social Engineering Webinar."

Accessed on 25 April 2024, 1457 UTC.

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  

Content and Source:  https://mail.google.com/mail/u/0/?tab=rm&ogbl#inbox/FMfcgzGxStqXlgLgTMWVvsQShXmRWQSF/CyberHawaii.

Please scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).


CyberHawaii, the Cybersecurity & Infrastructure Security Association, and the Federal Bureau of Investigation (FBI) present...


Access Management & Social Engineering Webinar


Tuesday, May 7, 2024

2 pm - 3 pm


Due to the sensitive nature of this presentation, this session will not be recorded and the slides will not be posted to the CyberHawaii website following the presentation.

Register today!

As a business, you want to make sure only authorized individuals have access to your company's most valuable information. This requires strong access management controls to ensure only those authorized have access to the information.


Unfortunately, hackers are expert in breaking through these controls. After they gain a foothold into your systems, hackers will not stop there. Their malware is programmed to try to access your databases, create new accounts, and move from one server to another server in your network. Hackers don't care about company size and target big and small alike.


Hackers employ social engineering techniques to persuade legitimate users to willingly give up information to gain access to systems and information that should be accessible only to authorized personnel.


Don't miss this opportunity to learn about Access Management and Social Engineering from experts from the Cybersecurity & Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI).

  

You’ll learn:

  • What Access Management is.
  • Access Management techniques and their strengths and weaknesses
  • Social Engineering techniques
  • Social Engineering scams
  • How to protect yourself and your business.

 

Presenters


Bruce Mirante, Cybersecurity State Coordinator CISA Region 9, joined the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) in January 2024.


Jasmine Lewis, FBI Special Agent, has worked for the FBI for over five years. SA Lewis works for the FBI Honolulu division Cyber Squad, focusing on cyber-criminal investigations.


Mahalo to our sponsors


This session is part of the 2024 Fortify Cybersecurity Webinar Series, sponsored by

CyberHawaii and CISA. This series was made possible by a grant from the Hawaii Department of Business, Economic Development and Tourism. Other supporters of this series include the State Office of Homeland Security, the FBI, Chamber of Commerce Hawai‘i, the Hawai‘i Defense Alliance and the University of Hawai‘i.

Register today!

CyberHawaii | www.cyberhawaii.org

Facebook  Twitter  Instagram

Saturday, April 20, 2024

CyberHawaii

"Internship and Security Leadership Webinar."

Views expressed in this cybersecurity and cyber crime update are those of the reporters and correspondents.  Accessed on 21 April 2024, 0309 UTC.

Content and Source:  https://mail.google.com/mail/u/0/?tab=rm&ogbl#inbox/FMfcgzGxSlWQqCmktvnqgCCzsZWmdVjw/CyberHawaii.

Please scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

CyberHawaii, in partnership with the Chamber of Commerce of Hawaii and the Cyber Readiness Institute, presents...

Register today!

Hawaii's businesses need to protect themselves from ever-evolving cyber threats. If your business does not have dedicated IT staff, you can integrate tech-savvy interns into your team to build your in-house security resources and augment the support you receive from vendors. Internships offer a cost-effective way to assess the fit of candidates with your business while allowing them to showcase their abilities. Learn about the valuable state and federal internship programs from the Chamber of Commerce Hawaii to help you mitigate hiring risks and foster talent crucial for your business's growth.


Session Agenda:


  • Overview of cybersecurity and the importance of cyber leadership 
  • Cyber Readiness Institute programs and certifications
  • Overview of Good Jobs Hawaii and federal internship offerings 
  • Employer and intern testimonials
  • Q&A and next steps 

CyberHawaii | www.cyberhawaii.org

Facebook  Twitter  Instagram

The Hacker News.

"THN Weekly Recap:  Top cybersecurity threats, tools and tips." Views expressed in this cybersecurity, cyber crime update are thos...