Cybersecurity

More information will be added soon.  Please refer to the Tech Collective Events page for our current offering of technical trainings and educational events. 

Loading Events

Past Events › Cybersecurity

Events Search and Views Navigation

Event Views Navigation

April 2020

The 5 Pillars of NIST

April 21 @ 10:10 am - 10:40 am EDT

The 5 Pillars of NIST The primary goal of our presentation is to: 1) Help organizations manage cyber risks2) Provide a common language to discuss cyber risks and 3) create, guide and assess or improve comprehensive cybersecurity programsAbout the presenter:Carl Benevento, cyber security specialist, will be sharing his insight and experience in the realm of physical, social and cyber security concepts. Carl has 30 years of experience in technology and security.Carl’s hands on security experience dealing with real time cyber…

Find out more »

Securing Your Remote Workforce: The Good, The Bad, and The Ugly

April 22 @ 11:00 am - 12:00 pm EDT

Securing Your Remote Workforce: The Good, The Bad, and The Ugly Coronavirus has hit and you are being asked to work from home. Now what? For over 20 years, we have been working remotely from our office. "Working from home" doesn't have to mean a degraded level of work or support you offer your clients or colleagues. In fact, it very well may mean you get more done! In this session, we'll show you how to do it. Please come…

Find out more »

System and Organization Controls (SOC) 1 & 2

April 28 @ 2:10 pm - 2:40 pm EDT

Overview and Importance in the Vendor Management process. System and Organization Controls (SOC) 1 & 2 Overview and Importance in the Vendor Management process.In this session, please join Doug Gerth from Wolf & Company for an overview of System and Organization Controls (SOC) Reports. Why would you have a SOC? What are the differences between the most common SOC reports, SOC 1 & 2? What is the difference between Type 1 & Type 2? Why would you ask your vendors…

Find out more »

May 2020

Cyber Security Challenges

May 5 @ 10:10 am - 10:40 am EDT

Current Cyber Security Challenges presented by the COVID-19 Pandemic Tech Collective understands the power of collective collaboration and together with our Committees has drafted a plan to support our Rhode Island Tech Ecosystem by hosting powerful events. Current Cyber Security Challenges presented by the COVID-19 PandemicIn this presentation we review:Present day cyber security challengesTechnologies to keep you cyber safeTips to keep Teleworking safeAbout the presenter:Carl Benevento, cyber security specialist, will be sharing his insight and experience in the realm of…

Find out more »

Open Source Security Tool Training

May 18 @ 6:00 pm - 7:30 pm EDT

Open Source Security Tool Series Crowdsourced from our Technology Professionals! A Walkthrough of OSINT ToolsThis will be a virtual event and the link will be sent to those who RSVP.Rae Baker is an expert in Open Source Intelligence (OSINT) investigations. For this meetup, she will walk us through some of the common freely available tools and her methodology.Some Important additional Details:Our Open Source Security Tool Series - A Walkthrough of OSINT Tools is taking place on Microsoft Teams . If…

Find out more »

Ransomware – Tales from the Trenches

May 26 @ 11:00 am - 12:00 pm EDT

Get prepared for a ransomware attack! About the presentation: Mandiant will discuss the current landscape as it relates to ransomware, present real-world case studies, and provide guidance on incident preparedness for organizations facing this threat. • Ransomware overview• Common infection vectors• Ransomware deployment trends• Recovery from ransomwareParticipants will walk away better prepared to address a potential ransomware attack in the future and will gain a deepened knowledge on how ransomware threat actors operate.About the Presenters: Manny Jean-Georges leads the Boston-based…

Find out more »

June 2020

Open Source Security Tool Training

June 15 @ 6:00 pm - 7:30 pm EDT

How to Make a PiHole Are you sick of seeing so many ads on web pages while you surf the internet at home? Worry about malware coming into your home network? Using a PiHole can eliminate a lot of that traffic. A PiHole is built with a Raspberry Pi, a small and inexpensive computer that you can buy from multiple sources for $40 or less. Dan and Dan will walk us through how to build one, install it on our…

Find out more »

Cybersecurity Failures and Legal Liability

June 23 @ 10:10 am - 10:40 am EDT

This presentation will touch upon the most common types of cyber-attacks This presentation will touch upon the most common types of cyber-attacks that are occurring now. The presentation will also provide examples of the types of legal liability that may result from a failure to adequately protect data.What participants can expect to gain: A more comprehensive understanding of the need to protect data and the legal consequences that may result from a failure to properly protect data.About the Presenter: Attorney…

Find out more »

Business Continuity: Critical Areas for Designing a Telework Solution

June 23 @ 1:00 pm - 2:00 pm EDT

Business Continuity: Critical Areas of Focus for Designing a Teleworker Solution. When business continuity plans are put in place, they are usually a response to unplanned events. In addition to enabling workers during a challenging time, how do we manage, deploy, and secure a new model of remote access? We’ll provide answers about what works (and what does not) when deploying remote solutions for workers.What participants can expect to gain: Candid and real-world perspectives on enabling a remote workforce.Who should…

Find out more »

Ransomware Relief

June 30 @ 10:10 am - 10:40 am EDT

Tech Collective understands the power of collective collaboration and together, with our Committees, has drafted a plan to support you. Our agenda is below- What exactly is ransomware?- How does it get in?- What are the hacker's motivations?- How can I protect against ransomware?About the presenter:Carl Benevento, cyber security specialist, will be sharing his insight and experience in the realm of physical, social and cyber security concepts. Carl has 30 years of experience in technology and security.Carl’s hands on security…

Find out more »

July 2020

Open Source Security Tool Training

July 13 @ 6:00 pm - 7:30 pm EDT

Domain Categorization with DomainCat This will be a virtual, online event. Link will be shared with those who RSVP.Domain Categorization is a useful tactic in helping secure your organization, but what is it, how does it work, and can it stop attacks against your organization? This talk will cover how domain categorization works and how to check categorizations on domains. For those on the red team side, we will look at how to get your domains categorized to bypass your…

Find out more »

PCI overview – Payment Card Industry, do you take credit cards?

July 28 @ 10:10 am - 10:40 am EDT

An overview of PCI DSS (Payment Card Industry Data Security Standard) compliance and what you need to be properly prepared to take credit An overview of PCI DSS (Payment Card Industry Data Security Standard) compliance and what you need to be properly prepared to take credit cards at your business. How do you take credit cards at your business? Do you have a completed Self-Assessment Questionnaire (SAQ)? About the Presenter: Doug Gerth: Doug has 24+ years of security related sales…

Find out more »

August 2020

Open Source Security Tool Training

August 17 @ 6:00 pm - 7:30 pm EDT

WiFi Security Testing Jesse Roberts of Compass IT Compliance will come back to talk about hacking WiFi access points. Whether it's WPA2 passwords or Enterprise, there's various things to think about and weaknesses to consider. Jesse will show how we can test these devices and tighten up the security.Some Important additional Details:Our Open Source Security Tool Series –WiFi Security Testing is taking place on Microsoft Teams . If you have never logged into a Microsoft Teams before, be sure to…

Find out more »

Shaping Security Transformation in Challenging Times

August 18 @ 1:00 pm - 2:00 pm EDT

Due to the sheer volume of the task, staying current on all those security dependencies is nearly impossible to do alone. Improving vulnerability management and remediation processes is a task that requires cybersecurity pros to actively keep up with the latest developments in the threat landscape, business environments, intelligence, services, and technology solutions. Due to the sheer volume of the task, staying current on all those security dependencies is nearly impossible to do alone. Join Steven Booth, FireEye Chief Security…

Find out more »

September 2020

CIS Top20: A prioritized set of actions to protect your organization

September 8 @ 10:10 am - 10:40 am EDT

This presentation will provide an overview of the Basic, Foundational and Organizational CIS 20 Controls. We will discuss the control categories, there significance to your organization and provide examples of what can occur if these controls are not put in place.What participants can expect to gain: An introductory overview of the CIS 20 Controls framework.Who should attend? IT Management & Executive Level ManagementAbout the presenter:Bruce Cheney: Bruce’s certification list reads like a scroll. His 20+ years of IT Experience and…

Find out more »

Strengthening Your Frontline of Defense Against Cyber Attacks

September 15 @ 10:10 am - 10:50 am EDT

Strengthening Your Frontline of Defense Against Cyber Attacks: Microsoft Advanced Threat Protection and KnowBe4 OverviewAs businesses come to rely more on technology, how do you protect yourself from cybercriminals? Join Kathleen Malin , VP of Technology and Operations Management of the RI Foundation, and Tricia King, Senior Consultant at Vertikal6, to learn about two tools that can be used to keep your business safe.Tricia will be covering Microsoft Advanced Threat Protection which provides protection across the Microsoft 365 environment. It…

Find out more »

Cyber Agility & Resiliency

September 22 @ 10:10 am - 10:40 am EDT

Approaching security programmatically enables organizations to be resilient and agile in enabling business continuity. Cybersecurity requirements are constantly evolving. Building capabilities, justifying investment dollars, designing and validating solutions gets easier to facilitate when you create a Security information management system; a programmatic approach. Have you embarked on your journey yet?What participants can expect to gain: Insight into building a strategic approach to operationalizing security policies, why follow a framework? How to establish security policies? Why document your capabilities? Who should…

Find out more »

CIS Top 20 “Data Recovery Capabilities”

September 29 @ 10:10 am - 10:40 am EDT

CIS Control #10 Building upon the CIS Top 20 presentation, we will dive into CIS’ Control 10, which details the processes and tools used to properly back up critical information with a proven methodology for timely recovery. We will walk through the importance of the 5 sub-controls and the risks associated with not implementing them.What participants can expect to gain:An understanding of why it is important to backup your data, test your backups, and take precautions to protect your backup.Who…

Find out more »

October 2020

2020 Cybersecurity Summit

October 7 @ 9:00 am - 11:00 am EDT

Click here to register for this event. The PBN Cybersecurity Virtual Summit – in partnership with the Tech Collective – is an informative, thought provoking discussion with experts in cybersecurity from the technology, education, legal, insurance and accounting industries, among others. With the current pandemic and more employees working remotely, we will provide important up-to-date information on a variety of threats and offer advice on securing network perimeters and preventing hackers from stealing client, customer, and employee information, as well as sensitive company data.…

Find out more »

CIS Top 20 “Secure Configurations for Network Devices, such as Firewalls, R

October 13 @ 10:10 am - 10:40 am EDT

Building upon the CIS Top 20 presentation, we will dive into CIS’ Control 11, which is meant to help organizations “ Building upon the CIS Top 20 presentation, we will dive into CIS’ Control 11, which is meant to help organizations “establish, implement, and actively manage (track, report on, correct) the security configuration of network infrastructure devices using a rigorous configuration management and change control process in order to prevent attackers from exploiting vulnerable services and settings”.What participants can expect:A…

Find out more »
+ Export Events