Subscribe | E-Editions | River News 75 | Super Shopper - FREE | About Us | Contact Us | FREE Classified Items Under $50
The Northwoods River News | Rhinelander, Wisconsin

Flanders Realty Group

home : community : community news
February 26, 2020

2/13/2020 7:30:00 AM
Cyber Hero Academy Feb. 27, 28 at Nicolet College

Protecting your business or organization form computer hackers is a never ending job. To help keep vital computer systems and networks safe and secure, Nicolet College is sponsoring a two-day Cyber Hero Academy Feb. 27 and 28 led by a national expert who will offer a multitude of strategies and techniques that can be applied to keep hackers out and your computer network protected, the college announced in a press release.

While the Academy is open to anyone, professionals from small and medium sized businesses as well as local government entities and municipalities are especially encouraged to attend, said Nicolet's chief information officer Greg Miljevich, who helped organize the academy.

"Large organizations often have the resources to have robust IT security teams," Miljevich said.

"What we've found is that many small and medium sized organizations in the Northwoods simply don't have the same means. The overall focus over the two days will be to help professionals in these organizations with a variety of their IT security needs."

The Cyber Hero Academy will run from 4 p.m. to 8 p.m., Thursday, Feb. 27, and from 8 a.m. to 4 p.m., Friday Feb. 28, in Northwoods Center 207-209 on the Rhinelander Campus.

The cost to attend is $1,295 and includes meals both days. For more information, and to register, visit nicoletcollege.edu/cyberhero or call (715) 365-4544.

The Academy will be taught by Kevin Hayes, chief information security officer at Merit Network, Inc. in Ann Arbor, Mich.

Hayes has extensive experience in the field of IT security with almost 15 years of professional working knowledge of the industry, the release states.

He is a part-time instructor for Wayne State University College of Engineering, teaching Intro to Applied Cybersecurity and Network Penetration Testing courses.

Hayes is also a frequent presenter at regional and national technology and cybersecurity conferences, including Educause, Merit, ISACA, and MUSIC.

He is a member of REN-ISAC, a higher education and research cyber security collaboration organization; a team leader for the Michigan Cyber Civilian Corps (MiC3), and a member of Information Systems Audit and Control Association and FBI Infragard (Detroit Chapter).

Academy workshops will include:

Threat on your Doorstep: Cybersecurity for Technical Managers - Comprised of several 50-minute modules, this workshop will focus on the current threat landscape, social engineering, critical controls, common attack vectors and more. You'll receive an in-depth overview of the various types of hackers, the nature and role of training programs, warning signs of an attack, and you'll also participate in a phishing demonstration.

The content will provide an analysis of the current threat landscape to ensure your organization is prepared to address cybersecurity incidents and threats.

Security on a Shoestring - Protecting your organization is getting tougher as prices for security products and services have skyrocketed over the last decade. While larger organizations are able to purchase necessary equipment and hire staff dedicated to security, small and medium sized businesses are not able to keep up.

Hackers know this and have redirected their efforts in hopes of pulling off the next large-scale breach.

There are plenty of low cost and no cost solutions available to organizations that have slim budgets.

Find affordable solutions to secure your small or medium business.

Incident Response Workshop - Build an incident response plan in this hands-on workshop. Incident response plans provide instructions for responding to a number of potential scenarios, including data breaches, denial of service/distributed denial of service attacks, firewall breaches, virus or malware outbreaks, and insider threats.

Without an incident response plan in place, organizations may either not detect the attack in the first place, or not follow proper protocol to contain the threat and recover from it when a breach is detected.

The IR Workshop is based on the National Institute of Standards and Technology (NIST) 800 framework for managing computer security incidents.





Article Comment Submission Form
Please feel free to submit your comments.

Article comments are not posted immediately to the Web site. Each submission must be approved by the Web site editor, and meet the comment guidelines (see "Comment Guidelines" at right). There may be a delay of 24-48 hours for any submission while the web site editor reviews and approves it.

Note: All information on this form is required. Your telephone number and email address is for our use only, and will not be attached to your comment.
Submit an Article Comment
First Name:
Required
Last Name:
Required
Telephone:
Required
Email:
Required
Comment:
Required
Passcode:
Required
Anti-SPAM Passcode Click here to see a new mix of characters.
This is an anti-SPAM device. It is not case sensitive.
   


Advanced Search
search sponsored by



Subscription Login
LOGIN | SUBSCRIBE


Today's Circulars
Print-N-Save Coupons
Order photo reprints

Classifieds
Advertising Information

Community Connections
Submit to Newspaper...

Ced Vig's books for sale
Kris Gilbertson's 'I Recall...'

Twitter









Life
Facebook | All Things | Wisconsin Lottery | The Lakeland Times - affiliate | Winter Road Conditions | Snow/Trail Conditions


The Northwoods River News | Walker Communications, LLC
232 S. Courtney Street, Rhinelander, WI 54501 | Office (715) 365-6397 | Fax (715) 365-6361

Corporate billing office: The Lakeland Times / Lakeland Printing Inc. | P.O. Box 790, Minocqua, WI 54548 | (715) 356-5236 | Fax (715) 358-2121
Members of the Wisconsin Newspaper Association, Wisconsin Community Papers, Rhinelander Area Chamber of Commerce, Minocqua Area Chamber of Commerce

Site Design and Content | Copyright 2020 1up!

Software © 1998-2020 1up! Software, All Rights Reserved