Loading the Elevenlabs Text to Speech AudioNative Player...

Webinar

Event date:

Jun 14, 2022

|

AGO

AGO

AGO

How to Secure Your Online Life

This special interactive panelist presentation includes cybersecurity experts who share key, actionable tips to help you secure your online life

secure your online life
secure your online life
secure your online life

HOW TO SECURE YOUR ONLINE LIFE SLIDES

Need a refresher on the cyber basics? The National Cyber Security Alliance and Verity IT are pleased to share “How to Secure Your Online Life,” in honor of Cybersecurity Awareness Month. 

If everyone does their part to implement stronger security practices, raise community awareness and educate vulnerable audiences, our interconnected world will be safer and more secure for everyone. 

This special interactive panelist presentation includes cybersecurity experts who share key, actionable tips to help you secure your online life, including: 

  • Best practices for password and account management 

  • Combating phishing attempts 

  • Protecting connected devices 

  • Understanding how your data and identity may be at risk 

Speakers: 
  • Michael Fagan, Computer Scientist, National Institute of Standards and Technology 

  • James Lee, COO, Identity Theft Resource Center 

  • Moderated by Jennifer Cook, Director of Marketing and Communications, National Cyber Security Alliance

Featured Articles

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.