The Salt Lake Chamber
26 04, 2022

Tech Tuesdays: Is Your Organization Vulnerable? The Importance of Penetration Testing

By |2022-04-28T07:59:06-07:00April 26th, 2022|Blog, Cybersecurity Month, Policy|0 Comments

Many organizations don't know the importance of conducting penetration and vulnerability testing. Hear from our expert on what a penetration test typically includes, the roles of Informational Security Officers (ISO) & Chief Information Security Officer (CISO), how much a breach can cost your business and more. Guest: Greg Johnson, CEO of WebCheck Security [...]

22 04, 2022

Danger in Your Ranks and the Evolving Cyber Threat Landscape

By |2022-04-22T09:39:50-07:00April 22nd, 2022|Blog, Cybersecurity Month, Policy|0 Comments

Learn strategies to reduce your cyber risk in this joint webinar panel discussion presented by the Salt Lake Chamber, The Buckner Company, Nexus IT Consultants, and Strong Connexions. Gain insights into how employees cause 95 % of all breaches and how to implement a strategy to reduce cyber risk by combining a [...]

7 04, 2022

Zero Trust Access 101 Webinar

By |2022-04-21T09:14:30-07:00April 7th, 2022|Blog, Cybersecurity Month, Policy|0 Comments

The dangers associated with complex enterprise design has led to the development of a new model for cybersecurity known as Zero Trust. A Zero Trust approach is primarily focused on data and service protection but can and should be expanded to include all enterprise assets. Learn from our panel of experts who discuss [...]

21 10, 2020

James Fair: Ransomware – How to Fend Off the Formidable Foe

By |2020-10-21T17:22:31-07:00October 21st, 2020|Blog, Cybersecurity Month, Policy|0 Comments

No matter what industry you're in or what position you hold, we're all at risk of an invisible enemy every day. That enemy is ransomware. Ransomware is the most dangerous, destructive cyber threat businesses face today. Businesses hit with ransomware can be forced to pay thousands to millions of dollars to restore their data, or [...]

17 09, 2020

Earl Foote: Work-From-Home Cybersecurity: Are You Prepared for Long-term Remote Work?

By |2020-09-17T08:37:53-07:00September 17th, 2020|Blog, Cybersecurity Month, Policy|0 Comments

However you secured your remote team at the start of the pandemic, now is the time to take it a step further. Are you properly secured for long-term remote work? If you’re reading this article, you understand the importance of remote cybersecurity, and rightfully so. Thirty-six percent of organizations have dealt with a security incident [...]

20 08, 2020

John McClurg: It’s Coming: National Cybersecurity Awareness Month

By |2020-08-20T09:58:28-07:00August 20th, 2020|Blog, Cybersecurity Month, Policy|0 Comments

As echoed frequently within the ranks of the military: “Proper Planning and Practice Prevents Piss Poor Performance.” While this truism is most often utilized to whip our nation’s first line of defense into fighting shape, it’s a credo that our cybersecurity community would do well to heed—especially given the fact that the space cybersecurity occupies [...]

15 01, 2019

Cybersecurity Lunch & Learn: Disaster Prevention & Response Plan

By |2019-01-15T12:18:38-07:00January 15th, 2019|Blog, Cybersecurity Month, Policy|0 Comments

NIST Computer Security Incident Handling Guide https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf Section 2.3.2 Plan Elements (page 8) Organizations should have a formal, focused, and coordinated approach to responding to incidents, including an incident response plan that provides the roadmap for implementing the incident response capability. Each organization needs a plan that meets its unique requirements, which relates to the [...]

12 10, 2018

Respond: 5 critical steps for responding to a cyber attack

By |2018-10-12T10:08:57-07:00October 12th, 2018|Blog, Cybersecurity Month, Policy|0 Comments

Cybersecurity affects every team, organization and industry. Many attacks can be categorized as high-magnitude crises with potential impacts that threaten the credibility, and perhaps even the survival, of affected organizations. Counterintuitively, the best time to respond to a cyber attack is before it occurs. An organization does not have sufficient time to complete the necessary [...]

5 10, 2018

You are a Target: Make Time for Cybersecurity

By |2018-10-12T09:04:36-07:00October 5th, 2018|Blog, Cybersecurity Month, Policy|0 Comments

Oftentimes businesses believe, “Cybersecurity is only for IT staff to worry about,” “I’m not a target,” “I can’t afford it,” “I don’t have time,” and “I’m not sure what to do.” October is Cybersecurity Awareness Month and we would like to fervently and directly extinguish these common falsehoods that may have crossed your mind. There [...]

Go to Top