SlideShare a Scribd company logo
1 of 1
Download to read offline
Cybersecurity: What Your Business Needs to Know!
Monday June 17, 2013
INTERNATIONAL MONETARY FUND
1900 Pennsylvania Ave NW, Washington, DC, 20431 (HQ2)
9 a.m. to 12 p.m.
The Applied Science Foundation for Homeland Security, District of Columbia’s Homeland Security and
Emergency Management Agency, InfraGard National Capital Region Members Alliance, Federal Emergency
Management Agency, Metropolitan Washington Council of Governments, and The George Washington
University would like to invite you to a special program focusing on helping small and mid-sized businesses
understand and prepare for cybersecurity threats. The event will be held on Monday, June 17, 2013 from 9
a.m. until 12 p.m. at the International Monetary Fund, 1900 Pennsylvania Ave NW, Washington, DC, 20431
(HQ2).
Threats to cyber space pose one of the most serious economic and national security challenges we face as a
country, but one that we are all inadequately prepared to counter. In fact, intelligence officials recently ranked
cybersecurity as a greater threat to our security than international terrorism. In 2011, accordingly to a study
released last year, there were 5.5 billion cyber attacks on computer networks in the United States … an 81%
increase from the year before!
Regrettably, there is no simple solution to solving this problem. With 95% of our nation’s businesses being
small and mid-sized the government cannot just deploy a “protective shield” over the internet. What is even
more disturbing is that, when polled, 83% of small businesses don’t have a cyber security plan in place.
Therefore, we all must do more to ensure that our networks are protected.
During this event you will hear from some of the best people in the country on the current threats your business
faces and, more importantly, learn ways that you can better protect your company.
Please register by no later than Tuesday, June 11th
at http://cyber06172013.eventbrite.com. There is no charge
for this event and seats are available on a first-come, first-serve basis.
This is a must attend event for every business in the National Capital Region!

More Related Content

What's hot

Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
Dominic A Ienco
 

What's hot (12)

When should whistleblowing become the response to corporate negligence
When should whistleblowing become the response to corporate negligenceWhen should whistleblowing become the response to corporate negligence
When should whistleblowing become the response to corporate negligence
 
Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012Cyber Law and Business Report Year in Review: 2012
Cyber Law and Business Report Year in Review: 2012
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Keys to Network Security & Shocking Statistics
Keys to Network Security & Shocking StatisticsKeys to Network Security & Shocking Statistics
Keys to Network Security & Shocking Statistics
 
P19 what were up against why good guys do bad things_sherri davidoff_6.12.19
P19 what were up against why good guys do bad things_sherri davidoff_6.12.19P19 what were up against why good guys do bad things_sherri davidoff_6.12.19
P19 what were up against why good guys do bad things_sherri davidoff_6.12.19
 
Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014Group letter to FTC calling for workshop examining data breaches - March 2014
Group letter to FTC calling for workshop examining data breaches - March 2014
 
5 Shocking Truths About Human Trafficking in America
5 Shocking Truths About Human Trafficking in America5 Shocking Truths About Human Trafficking in America
5 Shocking Truths About Human Trafficking in America
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
How secure are you?
How secure are you?How secure are you?
How secure are you?
 
[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and Compliance[Webinar Slides] The Simplest Route to Security and Compliance
[Webinar Slides] The Simplest Route to Security and Compliance
 
Local crash lawyer emphasizes consequences of distracted driving
Local crash lawyer emphasizes consequences of distracted drivingLocal crash lawyer emphasizes consequences of distracted driving
Local crash lawyer emphasizes consequences of distracted driving
 

Similar to Cybersecurity announcement final

Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Ben Griffith
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
TopCyberNewsMAGAZINE
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
Kristin Judge
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
Kevin Murphy
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
Kristin Judge
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
Eljay Robertson
 

Similar to Cybersecurity announcement final (20)

Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Advancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National PriorityAdvancing Women in Cyber Security Careers - A National Priority
Advancing Women in Cyber Security Careers - A National Priority
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
Policy Guide for Legislators
Policy Guide for LegislatorsPolicy Guide for Legislators
Policy Guide for Legislators
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 

More from David Jimenez

More from David Jimenez (20)

IAFIE Essay Comptetion 2019
IAFIE Essay Comptetion 2019 IAFIE Essay Comptetion 2019
IAFIE Essay Comptetion 2019
 
Iafie 2019 call for proposals (extended deadline)
Iafie 2019   call for proposals (extended deadline)Iafie 2019   call for proposals (extended deadline)
Iafie 2019 call for proposals (extended deadline)
 
Iafie instructor of_the_year_award_2017 (final) (2)
Iafie instructor of_the_year_award_2017 (final) (2)Iafie instructor of_the_year_award_2017 (final) (2)
Iafie instructor of_the_year_award_2017 (final) (2)
 
Iafie call for proposals (extended deadline) (1)
Iafie call for proposals (extended deadline) (1)Iafie call for proposals (extended deadline) (1)
Iafie call for proposals (extended deadline) (1)
 
Call for proposals (iafie) (2)
Call for proposals (iafie) (2)Call for proposals (iafie) (2)
Call for proposals (iafie) (2)
 
Iafie instructor of_the_year_award_2017 (final) (1)
Iafie instructor of_the_year_award_2017 (final) (1)Iafie instructor of_the_year_award_2017 (final) (1)
Iafie instructor of_the_year_award_2017 (final) (1)
 
Quarterly training agenda january 2017
Quarterly training agenda   january 2017Quarterly training agenda   january 2017
Quarterly training agenda january 2017
 
Jan 24 registration form
Jan 24 registration formJan 24 registration form
Jan 24 registration form
 
Call for proposals (iafie) (1)
Call for proposals (iafie) (1)Call for proposals (iafie) (1)
Call for proposals (iafie) (1)
 
Iafie europe 2017
Iafie europe 2017Iafie europe 2017
Iafie europe 2017
 
IAFIE Instructor of The Year Award 2017
IAFIE Instructor of The Year Award 2017 IAFIE Instructor of The Year Award 2017
IAFIE Instructor of The Year Award 2017
 
Mercyhurst
MercyhurstMercyhurst
Mercyhurst
 
Save the Date! Monday December 5, 2016 with Joe Caddell
Save the Date!  Monday December 5, 2016 with Joe CaddellSave the Date!  Monday December 5, 2016 with Joe Caddell
Save the Date! Monday December 5, 2016 with Joe Caddell
 
Nisa congres20160601 25_years_nisa_detailed_programme_v05(1)
Nisa congres20160601 25_years_nisa_detailed_programme_v05(1)Nisa congres20160601 25_years_nisa_detailed_programme_v05(1)
Nisa congres20160601 25_years_nisa_detailed_programme_v05(1)
 
Globalytica breda workshops jun 2016
Globalytica breda workshops jun 2016Globalytica breda workshops jun 2016
Globalytica breda workshops jun 2016
 
Washington DC Area Chapter of IAFIE Spring 2016 Newsletter
Washington DC Area Chapter of IAFIE Spring 2016 NewsletterWashington DC Area Chapter of IAFIE Spring 2016 Newsletter
Washington DC Area Chapter of IAFIE Spring 2016 Newsletter
 
The domestic intel flyer 3
The domestic intel flyer 3The domestic intel flyer 3
The domestic intel flyer 3
 
Lint Center Launches Partnership with IAFIE to Advance Intelligence Education
Lint Center Launches Partnership with IAFIE to Advance Intelligence EducationLint Center Launches Partnership with IAFIE to Advance Intelligence Education
Lint Center Launches Partnership with IAFIE to Advance Intelligence Education
 
Iafie clift
Iafie cliftIafie clift
Iafie clift
 
Iafie instructor of_the_year_award_2016_final
Iafie instructor of_the_year_award_2016_finalIafie instructor of_the_year_award_2016_final
Iafie instructor of_the_year_award_2016_final
 

Cybersecurity announcement final

  • 1. Cybersecurity: What Your Business Needs to Know! Monday June 17, 2013 INTERNATIONAL MONETARY FUND 1900 Pennsylvania Ave NW, Washington, DC, 20431 (HQ2) 9 a.m. to 12 p.m. The Applied Science Foundation for Homeland Security, District of Columbia’s Homeland Security and Emergency Management Agency, InfraGard National Capital Region Members Alliance, Federal Emergency Management Agency, Metropolitan Washington Council of Governments, and The George Washington University would like to invite you to a special program focusing on helping small and mid-sized businesses understand and prepare for cybersecurity threats. The event will be held on Monday, June 17, 2013 from 9 a.m. until 12 p.m. at the International Monetary Fund, 1900 Pennsylvania Ave NW, Washington, DC, 20431 (HQ2). Threats to cyber space pose one of the most serious economic and national security challenges we face as a country, but one that we are all inadequately prepared to counter. In fact, intelligence officials recently ranked cybersecurity as a greater threat to our security than international terrorism. In 2011, accordingly to a study released last year, there were 5.5 billion cyber attacks on computer networks in the United States … an 81% increase from the year before! Regrettably, there is no simple solution to solving this problem. With 95% of our nation’s businesses being small and mid-sized the government cannot just deploy a “protective shield” over the internet. What is even more disturbing is that, when polled, 83% of small businesses don’t have a cyber security plan in place. Therefore, we all must do more to ensure that our networks are protected. During this event you will hear from some of the best people in the country on the current threats your business faces and, more importantly, learn ways that you can better protect your company. Please register by no later than Tuesday, June 11th at http://cyber06172013.eventbrite.com. There is no charge for this event and seats are available on a first-come, first-serve basis. This is a must attend event for every business in the National Capital Region!