Planning ahead and having an incident response plan (IRP) in place is key.
Following an incident, organizations should analyze the results and discuss.
Whether you’re a government agency, Fortune 100 company, or a brick and mortar small business, cyber attacks are inevitable.
Yet time and again, we see large data breaches often as a result of inaction. In an online connected society others may suffer as a result of a business’s’ failure to act. As the voice of the business community, cybersecurity is a risk to all businesses and ultimately a shared responsibility. An important phrase for businesses to remember: “If you collect it you must protect it.”
It’s evident that becoming cybersecure is good for business. Today, cybersecurity threats are increasing and so are the damages they cause. Beyond the costs incurred from a data breach is the impact it has on a business’ reputation and consumer trust.
As stated in our annual Public Policy Guide, the Salt Lake Chamber supports improving business awareness of cyber threats and enhancing legal certainty, protection and response capabilities to mitigate cyberattacks and intrusions. We also support the development of cyber-focused workforce and other related economic development opportunities.
To further these efforts the Salt Lake Chamber is assuming an active role in educating the business community of the shared responsibility of cybersecurity through our partnerships with the Department of Homeland Security’s Stop.Think.Connect.™ and the U.S. Chamber of Commerce cybersecurity campaigns. The Chamber is also implementing Utah specific programs and initiatives to serve the needs of our unique business community.
The Cybersecurity Leadership Council is a collaboration of public-private partners to further the Salt Lake Chamber’s objective to educate the business community on the shared responsibility of cybersecurity. The council meets regularly to oversee the efforts of technology and cybersecurity initiatives, to strengthen education and awareness of cybersecurity in Utah’s business community, and to provide leadership and support to the broader community.
The Cybersecurity Leadership Council is comprised of business leaders, experts, and stakeholders that include public sector advisers, legal entities, insurance providers, technology companies and cybersecurity consulting firms as well as other critical industries with a vested interest in cybersecurity.
The Cybersecurity Leadership Council is directed by co-chairs Peggy Larsen, Sr VP Marketing at Workers Compensation Fund, and Jared Hoskins, Chief Operations Officer at Strong Connexions.
For more information contact email@example.com
Cybersecurity Leadership Council Members:
Cybersecurity Education and Awareness
The internet has always served as a channel for economic growth, but its potential vulnerabilities could lead to economic paralysis. The cybersecurity of organizations, governments and individuals alike is a shared risk and ultimately a shared responsibility.
As you increase your own cybersecurity awareness, consider these questions from the National Cyber Security Alliance:
- What information do you collect?
- How do you store the information?
- Who has access to the information?
- How do you protect your data?
- What steps are you taking to secure your computers, network, email and other tools?
Remember: if you collect it, you must protect it!
Cybersecurity Leadership Council Conference
Wednesdays in October and November
12:00 – 1:00 p.m.
Cybersecurity is fast becoming one of the most important topics for businesses to understand and embrace. With increasing threats to your employees’ and customers’ data security, as well as an explosion of remote work, having the right cybersecurity apparatus is more important than ever. Join Utah’s leading cybersecurity experts at the 2020 Cybersecurity Leadership Council Fall Conference, conducted virtually over a series of webinars, to ensure your business is equipped to survive and thrive in the 21st century.
October 7: If You Connect It, Protect It
October 14: Securing Devices at Home and Work
October 21: Securing Internet-Connected Devices in Health Care
October 28: The Future of Connected Devices
November 4: If You Connect It, Protect It 2.0
November 11: Securing Devices at Home and Work 2.0
November 18: Securing Digital Identities
November 25: The Future of Connected Devices 2.0