Loading the Elevenlabs Text to Speech AudioNative Player...

Webinar

Event date:

Jun 15, 2022

|

AGO

AGO

AGO

Keeping your Family Safe Online: Securing your Home and Devices

Cybersecurity and technology experts dive into how you can secure your devices and keep your family safe online.

webinar
webinar
webinar

Hosted by: National Cybersecurity Alliance and Palo Alto Networks

Most households & businesses today run a plethora of devices, including computers, gaming systems, TVs, tablets, smartphones and IoT devices that access wireless networks. However, if even one of these devices is not secure, it could provide an easy way for cyber criminals to access your entire home network. In the last year we have also seen work-from-home become a norm, which adds another layer of risk and complexity to the home network. To protect your home you need to have the right tools in place to have the confidence that family members can use the internet more safely and securely. Watch this recording session to hear cybersecurity and technology experts dive into how you can secure your devices and keep your family safe online.

Speakers:
  • Lisa Plaggemier, Executive Director, National Cybersecurity Alliance

  • Frances Dewing, Head of Product Management & Design for Okyo, Palo Alto Networks

  • Kelli Andrews, Senior Director, Cybersecurity and Lawful Access, Microsoft

  • Carlos Sotero, Chief Information Officer, Allstate Identity Protection

Featured Articles

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.