NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage
Search CSRC:

SBC Computer Security Workshops

Page Index:
About SBC Workshops || Workshop Schedule by U.S. Cities & States || Workshop Schedule by Dates || Workshop Agenda
(Note: the 2 workshop schedule tables contain the same exact information but arranged in different order.)

About SBC Workshops:

The National Institute of Standards and Technology (NIST), is a world leader in information security guidelines. Charged with providing guidelines for sensitive, non-secure, government computer systems, the documents produced by NIST on securing information are used throughout public and private sectors around the world. NIST has the mandate to contribute to improving the security of commercial IT products and strengthening the security of users' systems and infrastructures.

To this end, NIST, in co-sponsorship with the Small Business Administration (SBA) and the Federal Bureau of Investigation (FBI), conducts workshops on information security threats and solutions. Given NIST's expertise in the area of information security, SBA's extensive network built to help small businesses start, grow, and succeed, and the FBI's InfraGard program's frontline view of information security threats, the workshops resulting from this partnership deliver information security training to the small business community like no other. These workshops are especially designed for small businesses and not-for-profit organizations. Attendees will have the opportunity to explore practical tools and techniques that can help them to assess, enhance, and maintain the security of their systems and information.

Who should attend?

  • Small business owners
  • Small manufacturers
  • Local government employees
  • Teachers and school administrators
  • Computer users at non-profit organizations

Learn

  • How to protect your business from intentional attacks or unintentional damage by well meaning employees
  • How to guard against the embarrassment, legal liability or decreased productivity of security breaches
  • How to evaluate security tools and techniques based on your needs

These workshops are a part of NIST's outreach program. They are designed to make NIST resources more accessible to the small business owner, arming small businesses with specific techniques to improve their Information Security practices.

As part of the United States Department of Commerce, the National Institute of Standards and Technology works to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life.

 

View Workshop Schedule By (note: both tables below contain same information but arranged in a different order):
By U.S. Cities & States -- OR --
By Dates, then Locations in Chronological Order


2014 Locations & Dates By Dates:

Location Date / Time
Tustin, California
(Orange County)
December 12, 2014 : 9:00AM-1:00PM
Tustin Library Training Center
Glendale, California
(Los Angeles)
December 13, 2014 : 8:30AM-12:00PM
SBA Conference Room
San Diego, California December 16, 2014 : 1:00PM-5:30PM
Central Public Library
Back to Top

2014 Locations & Dates By U.S. States & Cities:

Location Date / Time
Glendale, California
(Los Angeles)
December 13, 2014 : 8:30AM-12:00PM
SBA Conference Room
San Diego, California December 16, 2014 : 1:00PM-5:30PM
Central Public Library
Tustin, California
(Orange County)
December 12, 2014 : 9:00AM-1:00PM
Tustin Library Training Center


Back to Top

Agenda:

What makes an effective information security program for a small organization? This educational presentation is intended to promote:

  • Awareness of the importance of need for IT security
  • Understanding of IT security vulnerabilities and corrective measures

The interactive discussion will focus on those information security risks facing all small organizations and how those risks can be identified and managed. Topics will include:

  • How your data is vulnerable
  • What you can lose through an information security breach
  • Practical steps to protect your operations
  • How to use information security vendors and consultants
  • How to evaluate tools and techniques based on your needs