Purdue MEP and PTAC are Proud to Announce FREE
20 Cyber Topics in 20 Weeks Webinar Series!
Many Indiana families are focused on remaining healthy during the COVID-19 crisis. Additionally, Indiana businesses are challenged to keep their business afloat as a result of the COVID-related loss of revenue. As a result, much of the Indiana Defense Industrial Base (DIB) has done little to prepare for Cybersecurity Maturity Model Certifications (CMMC) which will soon be mandatory to conduct business with DoD.
What can we do to help in this very busy and stressful time? Under the leadership of the Indiana Procurement Technical Assistance Center (PTAC), Purdue MEP and many Indiana cybersecurity providers have developed a series of essential cybersecurity topics. 20 cybersecurity topics in 20 weeks is an effort to provide Indiana businesses with the training needed to achieve CMMC Level 1/basic small business information security and to improve the Indiana DIB’s cyber-health. In addition to live webinars, all of the presentations will be recorded to create a library of cyber information that clients can view when they do have the time to focus on cyber health and defense acquisition regulation compliance.
20 weeks of cybersecurity training will begin this month and run through December 2020. These training sessions will be delivered by a wide-range of Indiana cybersecurity providers; Purdue cyberTAP, Sterlyn Group, TCC Solutions, Lifeline Data Centers, RevealRisk, AME Group, Sondhi Solutions, IU Health and more!
Cost? This training is free!
This Week’s Topic
|Cyber Topic/Concept||Presenter||Webinar Date||Description|
|Does having an anti-virus software with auto updates enabled really protect your company from malicious software? What are the limits? What else should/must you do? What software is prohibited when servicing DoD contracts? (CMMC L1).||Purdue cyberTAP||10/15/2020||Malware (short for Malicious Software or Malicious Code) is computer code written to steal or harm. It includes viruses, spyware, and ransomware. Sometimes malware only uses up computing resources (e.g. memory), but other times it can record your actions or send your personal and sensitive information to cyber criminals. This session will provide actions to consider beyond automatic anti-virus updates.|
To learn more about TCC’s Security Services please visit our website https://www.e-tcc.com/security-services