Purdue MEP and PTAC are Proud to Announce FREE
20 Cyber Topics in 20 Weeks Webinar Series!
Many Indiana families are focused on remaining healthy during the COVID-19 crisis. Additionally, Indiana businesses are challenged to keep their business afloat as a result of the COVID-related loss of revenue. As a result, much of the Indiana Defense Industrial Base (DIB) has done little to prepare for Cybersecurity Maturity Model Certifications (CMMC) which will soon be mandatory to conduct business with DoD.
What can we do to help in this very busy and stressful time? Under the leadership of the Indiana Procurement Technical Assistance Center (PTAC), Purdue MEP and many Indiana cybersecurity providers have developed a series of essential cybersecurity topics. 20 cybersecurity topics in 20 weeks is an effort to provide Indiana businesses with the training needed to achieve CMMC Level 1/basic small business information security and to improve the Indiana DIB’s cyber-health. In addition to live webinars, all of the presentations will be recorded to create a library of cyber information that clients can view when they do have the time to focus on cyber health and defense acquisition regulation compliance.
20 weeks of cybersecurity training will begin this month and run through December 2020. These training sessions will be delivered by a wide-range of Indiana cybersecurity providers; Purdue cyberTAP, Sterlyn Group, TCC Solutions, Lifeline Data Centers, RevealRisk, AME Group, Sondhi Solutions, IU Health and more!
Cost? This training is free!
This Week’s Topic
|Cyber Topic/Concept||Presenter||Webinar Date||Description|
How to protect organizational communications at key internal and external boundaries- firewalls, etc. (CMMC L1).
|The AME Group||10/1/2020||Firewalls and other devices can be used to block unwanted traffic such as known malicious communications or browsing to inappropriate websites, depending on the settings. Install and operate a hardware firewall between your internal network and the Internet. This session will review how to protect organizational communications at key internal and external boundaries.|
To learn more about TCC’s Security Services please visit our website https://www.e-tcc.com/security-services