BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//ChamberMaster//Event Calendar 2.0//EN
METHOD:PUBLISH
X-PUBLISHED-TTL:P3D
REFRESH-INTERVAL:P3D
CALSCALE:GREGORIAN
BEGIN:VEVENT
DTSTART;VALUE=DATE:20220322
DTEND;VALUE=DATE:20220323
TRANSP:TRANSPARENT
X-MICROSOFT-CDO-ALLDAYEVENT:TRUE
SUMMARY:KOSBE Presents: "Shields Up! Are You Prepared for a Cyber Attack on Your Business?" Webinar
DESCRIPTION:Topic: Disaster Mitigation\n\n\nAs a precursor to the Russian invasion of Ukraine that began earlier this year\, the modern day equivalent of this type of disruption began   Cybersecurity attacks. These Russian\, state level attacks focused initially on government and banking websites and networks to disable communication and cause increased confusion and disruption. In March\, the U.S. Cybersecurity and Security Agency (CISA)\, a division under the U.S. Department of Homeland Security\, issued an advisory that there will potentially be spillover to U.S. companies and commerce of these attacks (see below). As the U.S. and other companies ramp up sanctions against Russian interests\, there is the potential that Russia will increase their cyber-attack efforts directed at U.S. organizations.\n\nOne of the initial\, pre-invasion tactics an invading army will take is to disable the enemy's ability to communicate. Thus\, during WW II\, one of the tactics of French insurgents was to cut the phone lines prior to the Normandy invasion\, limiting the communication ability of the Germans. Prior to our movement into Iraq and Kuwait during the Persian Gulf War I in January of 1991\, our cruise missiles and bombing focused initially on command and control (including communication) targets within Iraq.\n\nAs of now\, each of us need to be aware there is an increased cyber threat and we need to be mindful of good cybersecurity hygiene\, to include the basics: Using a digital password manager with increased complexity to usernames and passwords\, integrating multi-factor authentication into as many sites as possible\, having strong backups of data and using a VPN.\n\nThis virtual workshop will cover the steps organizations can take immediately to ensure that:\n\n\n	The likelihood of a damaging cyber intrusion is reduced\n	A potential intrusion is quickly detected\n	An organization is prepared to respond if an intrusion does occur\, and\;\n	An organization has maximized their resilience in the face of a destructive cyber incident\n\n\nWho should attend:\n\nEvery U.S. organization (for profit and nonprofit)\, including federal agencies.\n\nPresented by:\n\nEric Carlson\, CEO\, President & Co-Founder at Blue Sky Cyber Inc.\n\nCarlson has over 30 years of professional experience in the US DoD\, US Government and Business sectors as a leader\, engineer and entrepreneur. He is a former SEAL Team operator and a current Cryptologic Warfare Officer in the US Navy Reserve. Carlson has a passion for technology\, product development and solving hard problems.\n\n\nCo-Sponsor(s): Kingsport Office of Small Business Development & Entrepreneurship (KOSBE)\; Kingsport Chamber\; TSBDC\, East Tennessee State University\, Blue Sky Cyber Inc.\n\nThis ZOOM virtual workshop is INTERACTIVE where the attendees can see and speak to each other\, and the Host and presenter can see and interact with the attendees. We encourage attendees to enter the meeting as if they are entering a room - with "Camera On." If camera and audio are not possible (or desirable) for attendees\, an in-meeting chat is also provided for attendees to send messages to the Host and other users within the meeting. Client confidentiality is of paramount importance to us. Except where a Client consents in writing or as directed by SBA per the statute (15 U.S.C.  648(a)(7))\, TSBDC is not permitted to disclose any Client Information to a third party (or share such information with other units of the organization not directly involved in the conduct of this project). Reasonable accommodations for persons with disabilities will be made if requested at least two weeks in advance.\n\n\n\nPlease contact Madison Smith - mvsmith@tsbdc.org\; 400 Clinchfield Street\, Suite 100\, Kingsport\, Tennessee 37660.\n\n\n\nRegister here: https://clients.tsbdc.org/workshop.aspx?ekey=10420012
X-ALT-DESC;FMTTYPE=text/html:<div style="color: rgb(0\, 45\, 98)\; font-family: &quot\;Open Sans&quot\;\, sans-serif\; font-size: 20px\;"><span style="font-size:16px\;"><span style="color:#000000\;">Topic: Disaster Mitigation</span></span></div>\n\n<div class="cdworkshopHTMLinfo" style="padding-top: 1em\; padding-bottom: 1em\; color: rgb(0\, 45\, 98)\; font-family: &quot\;Open Sans&quot\;\, sans-serif\; font-size: 20px\;">\n<p><span style="font-size:16px\;"><span style="color:#000000\;">As a precursor to the Russian invasion of Ukraine that began earlier this year\, the modern day equivalent of this type of disruption began &hellip\; Cybersecurity attacks. These Russian\, state level attacks focused initially on government and banking websites and networks to disable communication and cause increased confusion and disruption. In March\, the U.S. Cybersecurity and Security Agency (CISA)\, a division under the U.S. Department of Homeland Security\, issued an advisory that there will potentially be spillover to U.S. companies and commerce of these attacks (see below). As the U.S. and other companies ramp up sanctions against Russian interests\, there is the potential that Russia will increase their cyber-attack efforts directed at U.S. organizations.</span></span></p>\n\n<p><span style="font-size:16px\;"><span style="color:#000000\;">One of the initial\, pre-invasion tactics an invading army will take is to disable the enemy&rsquo\;s ability to communicate. Thus\, during WW II\, one of the tactics of French insurgents was to cut the phone lines prior to the Normandy invasion\, limiting the communication ability of the Germans. Prior to our movement into Iraq and Kuwait during the Persian Gulf War I in January of 1991\, our cruise missiles and bombing focused initially on command and control (including communication) targets within Iraq.</span></span></p>\n\n<p><span style="font-size:16px\;"><span style="color:#000000\;">As of now\, each of us need to be aware there is an increased cyber threat and we need to be mindful of good cybersecurity hygiene\, to include the basics: Using a digital password manager with increased complexity to usernames and passwords\, integrating multi-factor authentication into as many sites as possible\, having strong backups of data and using a VPN.</span></span></p>\n\n<p><span style="font-size:16px\;"><span style="color:#000000\;">This virtual workshop will cover the steps organizations can take immediately to ensure that:</span></span></p>\n\n<ul>\n	<li><span style="font-size:16px\;"><span style="color:#000000\;">The likelihood of a damaging cyber intrusion is reduced</span></span></li>\n	<li><span style="font-size:16px\;"><span style="color:#000000\;">A potential intrusion is quickly detected</span></span></li>\n	<li><span style="font-size:16px\;"><span style="color:#000000\;">An organization is prepared to respond if an intrusion does occur\, and\;</span></span></li>\n	<li><span style="font-size:16px\;"><span style="color:#000000\;">An organization has maximized their resilience in the face of a destructive cyber incident</span></span></li>\n</ul>\n\n<h5><span style="font-size:16px\;"><span style="color:#000000\;">Who should attend:</span></span></h5>\n\n<p><span style="font-size:16px\;"><span style="color:#000000\;">Every U.S. organization (for profit and nonprofit)\, including federal agencies.</span></span></p>\n\n<h5><span style="font-size:16px\;"><span style="color:#000000\;">Presented by:</span></span></h5>\n\n<p><span style="font-size:16px\;"><strong><span style="color:#000000\;">Eric Carlson\, CEO\, President &amp\; Co-Founder at&nbsp\;</span><a href="https://bluesky-cyber.com/" style="text-decoration-line: none\; transition: color 300ms ease 0ms\; color: rgb(209\, 18\, 65)\;"><span style="color:#000000\;">Blue Sky Cyber Inc.</span></a></strong></span></p>\n\n<p><span style="font-size:16px\;"><span style="color:#000000\;"><em>Carlson has over 30 years of professional experience in the US DoD\, US Government and Business sectors as a leader\, engineer and entrepreneur. He is a former SEAL Team operator and a current Cryptologic Warfare Officer in the US Navy Reserve. Carlson has a passion for technology\, product development and solving hard problems.</em></span></span></p>\n</div>\n\n<p class="cdworkshoptextinfo" style="white-space: pre-wrap\; color: rgb(0\, 45\, 98)\; font-family: &quot\;Open Sans&quot\;\, sans-serif\; font-size: 20px\;"><span style="font-size:16px\;"><span style="color:#000000\;">Co-Sponsor(s): Kingsport Office of Small Business Development &amp\; Entrepreneurship (KOSBE)\; Kingsport Chamber\; TSBDC\, East Tennessee State University\, Blue Sky Cyber Inc.</span></span></p>\n\n<p class="cdworkshoptextinfo" style="white-space: pre-wrap\; color: rgb(0\, 45\, 98)\; font-family: &quot\;Open Sans&quot\;\, sans-serif\; font-size: 20px\;"><span style="font-size:16px\;"><span style="color:#000000\;">This ZOOM virtual workshop is INTERACTIVE where the attendees can see and speak to each other\, and the Host and presenter can see and interact with the attendees. We encourage attendees to enter the meeting as if they are entering a room - with &quot\;Camera On.&quot\; If camera and audio are not possible (or desirable) for attendees\, an in-meeting chat is also provided for attendees to send messages to the Host and other users within the meeting. Client confidentiality is of paramount importance to us. Except where a Client consents in writing or as directed by SBA per the statute (15 U.S.C. &sect\;648(a)(7))\, TSBDC is not permitted to disclose any Client Information to a third party (or share such information with other units of the organization not directly involved in the conduct of this project). Reasonable accommodations for persons with disabilities will be made if requested at least two weeks in advance.<br />\n<br />\nPlease contact Madison Smith - mvsmith@tsbdc.org\; 400 Clinchfield Street\, Suite 100\, Kingsport\, Tennessee 37660.<br />\n<br />\nRegister here: </span><a href="https://clients.tsbdc.org/workshop.aspx?ekey=10420012">https://clients.tsbdc.org/workshop.aspx?ekey=10420012</a></span></p>\n
LOCATION:Virtual Event Register here: https://clients.tsbdc.org/workshop.aspx?ekey=10420012
UID:e.1906.7705
SEQUENCE:3
DTSTAMP:20260507T204116Z
URL:https://www.kingsportchamber.org/events/details/kosbe-presents-shields-up-are-you-prepared-for-a-cyber-attack-on-your-business-webinar-7705
END:VEVENT

END:VCALENDAR
