Is Your Data Secure? Protecting Your Municipalities’ Data From H@ck3r$: A Cybersecurity Journey
What & Were:

Cybersecurity is a journey and we will help you with a way forward no matter if you are a beginner, intermediate, or advanced traveler on this journey. 

Event Date:
Oct 02 at 12:00 pm - 1:00 pm

Join the Utah Cyber Center to discuss what municipalities can do to protect computer data from dreaded hackers.  Cybersecurity is a journey and we will help you with a way forward no matter if you are a beginner, intermediate, or advanced traveler on this journey.  We will discuss where and when to start, what to do, who can help, and resources available now. In the presentation we will also address the Cyber Defense Matrix, the five functions of the NIST cybersecurity framework, and the CIS Critical Security Controls and their implementation groups.

RSVP

Travis Scott is an Information Security Manager with the Utah Cyber Center and heads up the Local Government Cybersecurity Outreach Team. The focus of which is to assist local government entities in improving cybersecurity, protecting Utah Citizen’s data, sharing knowledge and intelligence, and jointly growing the cybersecurity community through cooperation in and across Utah government entities. Travis has worked in and around cybersecurity since 2014 and has been with the State of Utah for sixteen years, working as the Deputy Director of the Utah Statewide Information & Analysis Center (SIAC), prior to moving over to the Cyber Center.
Ben graduated from Montana State University with a BA in Religious Studies and worked in the higher education context for the greater part of a decade. He specialized in leadership development, non-profit fund advancement, recruiting, and public speaking. Ben decided to apply his skills to a long-term passion for technology and moved with his family to Utah. Ben has worked in the IT, Cybersecurity, and Compliance fields and now works as a Cyber Threat Intelligence Analyst at the Statewide Information & Analysis Center. He wants organizations and individuals to have the resources they need to protect themselves from cyber bad actors.

Comments are closed.

Close Search Window