28.01.2022 Views

NTCA Conference Program

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>NTCA</strong> 2021 CYBERSECURITY SUMMIT<br />

at a<br />

GLANCE<br />

WEDNESDAY<br />

OCTOBER 13<br />

1:30 p.m.–4:00 p.m.<br />

Preconference Workshops<br />

2:00 p.m.–4:00 p.m.<br />

Cybersecurity: The Real World<br />

Brought to you by CyberESI,<br />

Telcom Insurance Group<br />

and Womble Bond Dickinson<br />

5:00 p.m.–6:00 p.m.<br />

CyberShare Member Reception<br />

THURSDAY<br />

OCTOBER 14<br />

7:00 a.m.–8:00 a.m.<br />

Continental Breakfast<br />

8:00 a.m.–Noon<br />

Opening General Session<br />

8:00 a.m.–9:00 a.m.<br />

The Isle of Tortuga —<br />

but on the Internet<br />

Dan Tentler, Founder and Chief<br />

Technical Officer, Phobos Group<br />

9:00 a.m.–9:45 a.m.<br />

State of Ransomware 2021<br />

9:45 a.m.–10:15 a.m.<br />

Break<br />

10:15 a.m.–11:00 a.m.<br />

Ransomware Incident Response and<br />

Restoration<br />

THURSDAY<br />

OCTOBER 14 CONT.<br />

11:00 a.m.–Noon<br />

Ransomware Cyber Insurance<br />

Noon–1:30 p.m.<br />

Lunch<br />

1:30 p.m.–2:10 p.m.<br />

Breakout Sessions<br />

Level 1: A Beginner’s Guide to<br />

Comprehensive Cybersecurity<br />

Planning<br />

Level 2: Keeping the Cloud<br />

Protected from the Storm<br />

2:20 p.m.–3:00 p.m.<br />

Breakout Sessions<br />

Level 1: Cybersecurity for the<br />

Non-Technical Team Member<br />

Level 2: Making an Effective<br />

Security Operation Center<br />

3:00 p.m.–3:30 p.m.<br />

Break<br />

3:30 p.m.–4:10 p.m.<br />

Breakout Sessions<br />

Level 1: The GM Perspective<br />

on Cybersecurity<br />

Level 2: Implementing Zero<br />

Trust Networking<br />

THURSDAY<br />

OCTOBER 14 CONT.<br />

4:15 p.m.–5:00 p.m.<br />

<strong>NTCA</strong> CyberShare<br />

Networking Discussion<br />

5:15 p.m.–6:15 p.m.<br />

Networking Reception<br />

FRIDAY<br />

OCTOBER 15<br />

7:30 a.m.–8:30 a.m.<br />

Continental Breakfast<br />

8:30 a.m.–9:00 a.m.<br />

Agency Update—What Is on<br />

CISA’s Radar?<br />

9:00 a.m.–9:45 a.m.<br />

How to Create an<br />

Organizational Defense<br />

10:00 a.m.–10:30 a.m.<br />

Break<br />

10:30 a.m.–11:15 a.m.<br />

Supply Chain Assessment<br />

and Vulnerabilities<br />

11:15 a.m.–Noon<br />

Adventures of a Cyber Hero —<br />

A CTO’s Survival Guide<br />

Gary Berman<br />

Details are subject to change.


www.calix.com<br />

BE A WORK FROM HOME<br />

WIZARD<br />

with gigaspire blast!<br />

The superior<br />

solution that gives<br />

you WiFi that works!


"Gary has put together a great show with some<br />

great talent from the cybersecurity space. From<br />

newbies to executives, everyone can stand to<br />

learn from Gary's fun and often funny (but<br />

serious) show highlighting the unsung heroes in<br />

cybersecurity".<br />

Join our mission to shine the light on<br />

the UNSUNG CYBER HEROES who<br />

toil in anonymity to keep us safe and<br />

Defend the Digital Universe!<br />

Meet members of The Cyber Hero<br />

Network who participate in highlevel,<br />

thought leadership Cyber Hero<br />

Adventures Shows, Micro Think<br />

Tanks and other B2B activities...<br />

"What a pleasure professionally to work with Gary<br />

Berman and Cyber Heroes! I've participated in<br />

several sessions he's hosted and produced and am<br />

pleased with the high caliber of the discussion he<br />

stimulates and end product he creates. Gary invites<br />

(and gets) some pretty high-powered people".<br />

"Gary‛s show is highly relevant, informative<br />

and entertaining. His questions are always on<br />

point and his guests offer helpful insights to<br />

those of us in critical infrastructure. (You‛re<br />

a great host, Gary.)".<br />

"Gary Berman is a marketing genius. With humor<br />

and aplomb he takes complex subjects and makes<br />

them accessible to everyone. He has been the<br />

pied piper for cyber security for several years<br />

now and his show is followed by thousands. I was<br />

honored to be featured myself and encouraged<br />

anyone who is invited to participate".<br />

www.cyberheroescomics.com


AFTE:R BUILDING Hl5 COMPANY THROUGH TE:N Yl':AR5 OF BLOOD, 5WE:AT ANO TE:AR5,<br />

1,-NTRl':PRl':Nl':UR L.ARRY JON!,-5 51GN5 A 01':AL WITH A LARGE: GLOBAL 5TRATl':GIC PARTNl':R.


PP!oNE:DWIT<br />

PORT OF MY Q<br />

TH!o LOV!o OF<br />

MUNCHKINS/<br />

lo HARD WO<br />

D D!oDICATION<br />

lo IN THIS R<br />

AST T!oN YioA<br />

!oM8ARKING


RE:VE:NUE: WAS UP AND THINGS<br />

WE:RE: GOING GRE:AT UNTIL ONf;.<br />

DAY ON THf:. BASKf:.TBAL.L. COURT...<br />

UNFORTUNATE:LY,<br />

THAT'S NOT THE:<br />

BAD NE:WS.<br />

THE: SCAN ALSO<br />

TURNE:D-UP SE:VE:RAL<br />

BLOOD CLOTS THAT COULD<br />

BE: LIFE:-THRE:ATE:NING IF<br />

WE: DON'T Sf;!, TO THE:M<br />

RIGHT AWAY.


OON'T WORRY<br />

ABOUT ANYTHING L.ARRY •<br />

.JUST GE:T BE:TTE:R 500N.<br />

I'LL. LOOK AFTE:R THE:<br />

COMPANY AS IF IT<br />

WE:RE: MINE:.<br />

THl5 15 .JAY AT<br />

HE:LIX ME:OIA. I GOT<br />

AN ANONYMOUS CALL<br />

ALLE:GING FRAUD IN<br />

YOUR COMPANY.<br />

PLE:A5E: RE:FUNO MY<br />

RE:TAINE:R UNTIL YOU<br />

5E:TTLE: ALL THIS.<br />

2]<br />


LAvV Fl RM<br />

This letter serves to inform you that my firm has been<br />

----ietained by Lighthouse Imaging in a matter that is of grave<br />

rn to your company. Please call m<br />

· est<br />

WHY ARE, THE,<br />

PHONE,5 5UDDE,NL Y 51Lf;NT<br />

f;XCE,PT FOR ALL THE,51,<br />

COMPLAINTS?<br />

WJ,10 MADE, THE,51,<br />

CALL5 ALLE,GING<br />

FRAUD?


C ftorl o new romponY,<br />

wnile still on poyroll<br />

C {opy inte!lertuol roperty files<br />

(indurling presentot1ons/<br />

g !Jownloorl rlient list<br />

C {o/1 clients ononymous/y,<br />

o//eging frourl<br />

!! Reseorrl otl,er woys to /Juilt!<br />

new rompony on tneir dime


Y LAWYE:R IN515<br />

5HE: RE:AD ANY AG<br />

BE:FORE: I 51GN IT<br />

IT WITH ME:<br />

OH MR J<br />

WHAT WOULD<br />

ABOUT ANY OF<br />

HAVE: MY D


... CLOSE; THE; DOORS<br />

TO HIS CORPORATE;<br />

OFFICE;S AND ...<br />

FROM SPORT<br />

UST CONFIRME;D TH<br />

f; THE; CONTRACTS<br />

IPLE: TIME:S ...<br />

1vlarket C<br />

es 2<br />

onsultants<br />

R SE:VE:RAL YE:ARS WHILE: 1-ARRY ATTE:MPTS TO RE:BUILD<br />

1-E;PHONf; CAl-1-S ARE; RE;DIRE;CTf;D, FILf;S Rf;GULARLY<br />

COMPLE:TE:LY FROM HIS COMPUTE:RS. INTRUSIONS INTO


! HOPE, THAT<br />

AND YOUR FAMI<br />

5<br />

-EoNTEoR THEo MARKEoTING FIEoLD ...<br />

[fl[jJ<br />

Rachael Stephen Darra Max<br />

Rich Barnes Argente Burgess<br />

Shannon<br />

Chen<br />

Dr Logan<br />

Kingston<br />

T 5EoVEoRAL. OF Hl5 FORMEoR Eo<br />

T 15 l-lN -


AFTE:R ANALYZING THE:<br />

DE:TAIL5 OF THE:5E: COMPUTE:R AND<br />

PHONE: 5CRE:E:N 5HOT5, IT LOOKS LIKE:<br />

OH, WOW!<br />

YOU ARE: UNDE:R A HE:AVILY ORCHE:5- FE:E:L5 GRE:AT TO HAVE:<br />

TRATE:D CYBE:R ATTACK.<br />

50MWNE: IN YOUR 5HOE:5<br />

----E::=:::\ THINK THAT IT MAKE:5 5E:N5E:.<br />

WHAT 00 WE: 00 NE:XT?<br />

Hae<br />

HE: ATTE:ND5 CONHRE:NCE:5, Ll5-<br />

TE:N5 TO COUNTLE:55 PODCA5T5,<br />

RE:AD5 RE:5E:ARCH RE:PORT5 AND ...<br />

! SPOKE:<br />

E: DISTRICT A<br />

E:Y, BUT HE:R 0<br />

WILLING<br />

LE:ARN E:VE:RYTHING HE: COU<br />

WORLD OF HACKING TO HE:LP<br />

N ONION, BE:GIN5 TO<br />

WHAT 15 HAPPE:NING.<br />

! SURE: HAD<br />

TO WIPE: A LOT OF<br />

EGG OFF MY FACE<br />

TO STAND UP AT<br />

THE: MIC .•.<br />

HE: ALSO RE:CE:IVE:5 INCRE:DIBLE: ADVICE: AND SUPPORT<br />

FROM THE: GOOD FOLKS IN CYBE:R5E:CURITY.


5UP!:R AG!:NT K HAS ALWAYS HAD A<br />

PASSION FOR LAW l:NFORC!:Ml:NT.<br />

HIS GRANDFATH!:R AND FATH!:R W!:Rl: HIGHLY Rl:SP!:CT!:D<br />

Sl:NIOR LAW !:NFORC!:Ml:NT OFFICIALS. 5UP!:R AG!:NT K<br />

Al.WAYS WANTE:O TO FOLLOW IN TH!:IR FOOTST!:PS.<br />

AN<br />

BU<br />

LARRY ANO 5UP!:R AG!:NT K Bl:COM!:<br />

FAST FRl!:NDS WITH A UNIFl!:D MISSION:<br />

TO PROT!:CT AND Dl:Fl:ND OTH!:RS<br />

FROM TH!: l:)(Pl:Rll:NC!:5 TH!:Y HAD/


SUPER AGENT K AND I..ARRY ARE INVITED<br />

TO A CYBERSECURl1Y CONFERENCE<br />

HOSTED AT THE NEXT GEN INSTITUTE.<br />

----<br />

LOWS YOU TO SEE V<br />

55ES OF HACKERS AN<br />

IMINALS AS THEY ARE<br />

"REAL" WORLD.


0<br />

0 0<br />

0


'<br />

MMON CLA55 Of HACK, AND THE:<br />

D WORK TIRE:LE:55LY TO PROTE:CT<br />

BRING DOWN THE: PE:RPE:TRATOR5.<br />

0<br />

---<br />

Re: Donation to Love Your Heart Foundation<br />

CEO Jeremy Diamond<br />

CFO Harald Jonah<br />

SUBJECT: Good Morning!<br />

WATCH OUT fOR<br />

fAKE:/5POOfE:D<br />

E:MAIL ADDRE:55E:5!<br />

E:!lt<br />

Yes, I am.<br />

Hello Harry, are you in the office right now?<br />

0<br />

I'm at an event playing golf with some other<br />

CEOs and need you to wire $SOK right away for<br />

this fundraiser.<br />

www.hartfoundation.org


LE; Of OTHE;<br />

IVE;S KNOW A<br />

AMOND'S HEcA<br />

DITION, RIGH<br />

Mark De l ete Compose Inspector<br />

WIRE TRANSFER INSTRUCTIONS<br />

Personal • Leads<br />

art Foundat on<br />

'og•<br />

Folders<br />

CEO Jeremy Diamond<br />

CFO Harald Jonah<br />

Fill out and transfer the funds as soon as possible. I want to announce my<br />

contribution during lunch. Very important to do it before lunch.<br />

CFO Harald Jonah<br />

CEO Jeremy Diamond<br />

What's the nature of this fundraiser?<br />

CEO Jeremy Diamond<br />

CFO Harald Jonah<br />

All the information is included in my previous message. I need you to transfer<br />

the funds as soon as possible.<br />

BE; CAREcfUL WHAT YOU PUT ONLINE;<br />

BEcCAUSE; IT MAY BE; USE;D AGAINST<br />

YOU AND IT WILL BE; "PUBLIC AND PE;R• ,<br />

MANEcNT" ACCORDING TO RICHARD<br />

GUE;RRY, FOUNDEcR Of THE; INSTITUTE;<br />

FOR REcSPONSIBLE; ONLINE; AND CE;LL·<br />

PHONE; COMMUNICATIONS.<br />

n. CFO Harald Jonah<br />

o CEO Jeremy Diamond<br />

I'm on it!


5T E:MAILE:D M<br />

CTING ME: TO<br />

IF1Y-THOU5AND<br />

TO THl5 FUND<br />

OUR HE:ART, NO<br />

T5 OR PACE:


Yf;S, I'VE:<br />

CHE:CKE:D THE:M OUT.<br />

THE:Y HAVE: A SOCIAL<br />

ME:DIA PRE:SE:NCf; AND<br />

SUCH, ALL GOOD/<br />

I COMPLE:TE:D THE:<br />

FORM AND SIGNW THE:<br />

PAPE:RWORK. I AUTHO·<br />

RIZE: YOU TO E:XE:CUTf;<br />

THIS RIGHT AWAY!<br />

WE:LL, THE:<br />

YOUR SIGN<br />

LL SE:E:MS


,,.<br />

Compost"<br />

Re: Donation to Love Your Heart Foundation<br />

rom: Abigail Arnold, Accounting<br />

C§!JIJ CFO Harald Jonah, CEO Jeremy Diamond<br />

0<br />

Subject: Task Completed<br />

Per your instructions and<br />

authorization in regards to Mr<br />

Diamond's request. Herc ,••...-,.,....<br />

confirmation number.<br />

.,,n,<br />

M•Tofoldff .•<br />

TO Ameritrade Wire Tram ,.<br />

,.,,,<br />

From: account no: ********<br />

To: account: **********7521 ,....<br />

RONmo<br />

CrutoO


AFTE:R 5WAL<br />

CFO HARAL<br />

"


DR G IMME:DIATE:LY FINDS THE: RE:D FLAG:<br />

A WE:LL-Dl5GUl5E:D FAKE: E:MAIL ADDRE:55. 50<br />

APPARE:NT TO THOSE: IN·THE:·KNOW, WHO LOOK A<br />

1-ITTLE: DE:E:PE:R, AT THE: ACTUAL E:MAIL ADDRE:55.<br />

/<br />

Compose<br />

Re: Donation to Love Your Heart Foundation<br />

<br />

F,om, EOJo,omy Di•mo,_<br />

SUBJE l<br />

Jeremy Diaffi"ond<br />

jeremydiamond8298@aol.com<br />

Hello ,<br />

FAKE: l>MAIL ADDRE:55!<br />

I Add to contacts<br />

Emails<br />

'<br />

THING HE:'LL<br />

0 VO RIGHT N<br />

CONTACT TH<br />

N BANK AND<br />

E:ZE: ON THO<br />

HE:IVE:5 WO<br />

E: TO WITHDRA<br />

ONE:Y BUT THE: CO<br />

50 WON'T BE: ABLE:<br />

E:R THE: FUNDS UNT<br />

15 50LVE:D, MAYBE: I<br />

AR5 OR MANY YE:AR<br />

UNLE:55 ...


!oMAIL<br />

5T ABOUT<br />

L 5!o!o If W!o<br />

IT!o5 BAC


CEO Jeremy Diamond<br />

Abigail Arnold<br />

Additional Funds for Love Your Heart Foundation<br />

A<br />

□<br />

Hello Mr. Diamond,<br />

I hope your morning on the links has refilled your tanks. Jane showed up this morning with a<br />

new perfume, whew! My allergies are on code red! But I digress ...<br />

Per your request, I wire-transferred $50,000 to account number 92-6937739. As I was doing<br />

that, I stumbled on your memorandum regarding doubling the amount of donations to heart<br />

disease research charities as a company policy for the new year.<br />

Our protocol dictates that you "sign off" on our secure website by entering pin [xz19I0] to<br />

authorize the extra $SOK. I'm providing the details here for your convenience, since I know<br />

you're at the event and might not have it handy.<br />

Arrow Bank<br />

Acct No: 6070255747179<br />

Routing: 092707912<br />

u/n: TheSquarePointGroup (case sensitive)<br />

p/w: playsD3ADtH3Pr1 nt3rD03S<br />

If you have any trouble entering the code, try lower case first then all caps. If you still have<br />

trouble, email or call me and I will assist you. Once that's done, Abigail will wire-transfer the<br />

extra funds.<br />

Let me know if you need anything else. See you bright and early.<br />

-Harald<br />

WE:!.!., I'VE: P<br />

THE: CYBE:R 8<br />

15Tl.f;5 TO 8!:<br />

CK THE: PE:<br />

ME:ANWHII.E: ... DR G 15<br />

5HING TOUCHE:5 ON A<br />

Y-RE:Al.15TIC-I.OOKING f


PH!5H!NG !5 THE: MOST COMMON TYPE: OF ONl.!NI:- SCAM. !T RE:FE:RS<br />

TO ANY ATTACK BY WHICH FRAUDSTERS IMPE:R50NATE: A I.E:GITIMATE:<br />

COMPANY ANO ATTEMPT TO STE:At. PE:R50NAI. INFORMATION OR I.OGIN<br />

CRWE:NTIAI.S. THOSE: E:MAII.S FRE:QUE:NTI.Y USE: THRE:ATS ANO A SE:NSE:<br />

OF URGE:NCY TO SCARE: USE:RS INTO DOING THE: ATTACKE:RS' BIDDING.<br />

!N SPE:AR PHISHING SCAMS, FRAUDSTE:RS CUSTOMIZE:<br />

THE:IR ATTACK E:MAII.S WITH THE: TARGE:T'S NAME:, POSITION,<br />

COMPANY, WORK PHONE: NUMBE:R AND OTHER INFORMATION<br />

IN AN ATTE:MPT TO TRICK THE: RE:CIPIE:NT INTO BE:I.IE:VING<br />

THAT THE:Y HAVE: A CONNECTION WITH THE: SE:NDE:R.


_:_::.<br />

THf:. CYBf:.RHf:.RO "UNMA5K5" THf:. PHl5Hf:.R BY DRAINING<br />

Hf:.R Mf:.MORY 8ANK5 AND COl.t.f:.CTING DATA THAT Wit.I.<br />

PO51TIVf:.t.Y IDf:.NTIFY Hf:.R IN THf:. Rf:.At. WORLD/<br />

CYBf:.RHf:.ROf:.5 ARf:. A8t.f:.<br />

f:.CT AND MAKf:. AN ARRf:.5T/<br />

THf:. CYBf:.RHf:.ROf:.5' WORK Nf:.Vf:.R 5TOP5/<br />

TUNf:. IN FOR THf:. Nf:.XT 155Uf:. OF THf:.<br />

CY8ERHERO A0VENTUREG!


IVAN STEALS '!'OUR NAME, DATE<br />

OF BIRTH, SOCIAL SECURIH<br />

NUMBER, DRIVER 1 S LICENSE<br />

NUMBER, BAN1' ACCOUNT AND<br />

CREDIT CARD NUMBERS, PIN<br />

NUMBERS, ELECTRONIC<br />

SIGNATURES, FINGERPRINTS,<br />

AND PASSWORDS... ALL IN AN<br />

EFFORT TO BECOME '(OU!<br />

Ar LEAST FOR THE<br />

PURPOSES OF STEALING<br />

'!'OUR MONE'!' AND<br />

APPL 'l'ING FOR LOANS<br />

CREDIT CARDS IN<br />

'(ou'LL HPICALL'I'<br />

A VARIEH OF<br />

• RUMMAGING<br />

GARBAGE FOR<br />

PERSONAL DOCUMENTS<br />

AND PHONES.<br />

• STEALING '!'OUR<br />

CREDIT CARDS,<br />

CARDS, PASSPORTS AND<br />

TO1'ENS.<br />

• UUESSING COMMON<br />

QUESTIONS SUCH AS:<br />

MAIL TO OBTAIN<br />

IDENTIFICATION<br />

AUTHENTICATION<br />

11:NOWLEDGE<br />

1 1 MOTHER 1 S MAIDEN<br />

NAME?", 11 FIRST CAR<br />

MODEL?" OR<br />

1 1<br />

1FIRST PET S NAME?"<br />

• S1'IMMING<br />

INFORMATION FROM<br />

CREDIT CARDS USING HAND-HELD CARD READERS.<br />

• I-IAC1'ING CO<br />

BASES TO OBTAIN<br />

LARGE QUANTITIES.<br />

• BRUTE-FORCE<br />

WORDS.<br />

• BROWSING<br />

SITES FOR PER-<br />

8'1' USERS.<br />

• DIVERTING<br />

IN ORDER TO<br />

TION AND CRE­<br />

CARDS, BILLING<br />

STATEMENTS, OR<br />

NEW ACCOUNTS<br />

MENTS OPENED<br />

THIEVES IN THE<br />

•USING 1 CONTACTLESS 1<br />

CREDIT CARD READERS TO<br />

ACQUIRE DATA WIRELESSL 'I'.<br />

• DISCREETL 'I' WATCHING OR<br />

HEARING OTHERS PROVIDING VALU­<br />

ABLE PERSONAL INFORMATION<br />

(SHOULDER-SURFING).<br />

• STEALING PERSONAL INFORMA­<br />

TION FROM COMPUTERS USING<br />

BREACHES IN BROWSER SECURI­<br />

MALWARE SUCH ASTRO.JAN<br />

1'E'l'STRO1'E LOGGING PRO-<br />

PUTER NETWOR1'S AND DATA­<br />

PERSONAL DATA, OFTEN IN<br />

ATTAC1'ING WEAi( PASS­<br />

SOCIAL NETWOR1'ING<br />

SONAL DETAILS PUBLISHED<br />

VICTIMS 1<br />

EMAIL OR MAIL<br />

OBTAIN PERSONAL INFORMA­<br />

DENTIALS SUCH AS CREDIT<br />

AND BANl


0<br />

0<br />

0<br />

1Ji1o<br />

<br />

o<br />

I)<br />

0<br />

@]


LAl212'( IS A "12E


The small broadband provider ISAC<br />

EFFICIENT. AFFORDABLE. EFFECTIVE.<br />

CyberShare provides education and awareness of cybersecurity risk<br />

management practices and empowers you to take action.<br />

Relevant information<br />

The alerts and news are<br />

compiled specifically for<br />

small broadband providers.<br />

Access to experts<br />

Hear from government and<br />

industry experts you may not<br />

have access to otherwise.<br />

Efficient and time saving<br />

Access critical information<br />

compiled from public and<br />

nonpublic sources and tailored<br />

to your needs. Participants<br />

avoid spending hours each day<br />

combing sources.<br />

Peer-to-peer sharing and<br />

networking<br />

Develop relationships across<br />

the country and securely<br />

share information.<br />

Affordable<br />

CyberShare costs a fraction<br />

of what you would spend for<br />

larger cyberthreat products<br />

but offers more targeted<br />

information. Members also may<br />

earn a discount on their cyber<br />

insurance policy.<br />

Illustrates commitment to<br />

cybersecurity<br />

Show your customers and<br />

policymakers that you prioritize<br />

cybersecurity.<br />

Training tools<br />

Access the SecurityScorecard<br />

Cybersecurity Risk Ratings and<br />

CyberESI training module to use<br />

for companywide cybersecurity<br />

training.<br />

CyberShare, launched in 2019, was recently recognized as an Information<br />

Sharing and Analysis Center (ISAC), which establishes the program as<br />

THE ISAC for the small broadband community.<br />

90%<br />

of participants say the program<br />

adds value for their company<br />

86%<br />

would recommend the program<br />

to peers and other small<br />

network operators<br />

I was extremely happy with CyberShare —<br />

The Small Broadband Provider ISAC<br />

program’s communications regarding<br />

the exploitation of SolarWinds Orion<br />

Platform. Their operations manager<br />

provided timely, relevant and actionable<br />

information throughout the day, including<br />

an invitation to a Cybersecurity and<br />

Infrastructure Security Agency (CISA)<br />

meeting, which I attended. Solid return<br />

on investment for joining CyberShare.<br />

93%<br />

KURT FILES<br />

of participants say the program<br />

enhances their situational<br />

awareness about cyberthreats<br />

Director of IT, Home Telecom<br />

(Moncks Corner, SC)<br />

Learn more about how CyberShare can benefit your business by visiting www.cyber-share.org.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!