Viewing 0 current events matching “cybersecurity” by Date.

Sort By: Date Event Name, Location , Default
No events were found.

Viewing 5 past events matching “cybersecurity” by Date.

Sort By: Date Event Name, Location , Default
Mar 22, 2017
CyberSecurity Nexus Fundamentals
University of Toledo, University Computing Center

The Northwest Ohio ISACA Chapter will be hosting a full-day CyberSecurity Nexus Fundamentals (CSX) review program. As the entry point into the cybersecurity program, CSX offers a certificate in the introductory concepts that frame and define the standards, guidelines and practices of the industry.

  • Date: Wednesday, March 22, 2017
  • Time: 8:30 am - 4:30 pm
  • Location: University of Toledo Main Campus, University Computing Center
  • Cost to Members: $25 for all ISACA members in good standing as of March 1st
  • Cost to Non-members: $200 - however, if you register to become an ISACA member before March 1st you will receive the nominal member rate ($25). Click here to become a member of ISACA today.
  • Cost of Materials: Included in the cost of registration.
  • Instructor: Mr. Robert Ramsay, CPA, CISA, CITP. Robert works for the Barnes Dennig services firm and has been certified by ISACA to teach CSX courses. Robert is also President of the Greater Cincinnati ISACA Chapter.

The course/program is designed to cover all of the topic areas necessary to prepare you for taking and passing the CSX certificate exam.

Members and non-members alike are welcome to participate in this training program.

Jun 21, 2017
Cyber Security: Confidentiality, Integrity, Availability
Advanced Manufacturing Training Center at UT Scott Park

Cyber security is a relevant topic right now. Regardless of the type of business you operate, if you work online you are at risk.

Cyber security is not just a technology based issue. Organizations must incorporate cyber risk management into their day-to-day operations. They must also be prepared to respond to a cyber attack, restore operations and ensure that the company’s assets and reputation are protected.


  • Risk Management – A cyber security breach will cost your business. Lost revenue, lawsuits, and damaged reputation could greatly injure or even shut down your company. In this session learn how to keep your company’s assets safe from a cyber attack.
  • Culture Management – Establishing a cyber security culture advocates the need that everyone – including management – has an equal part in cyber security. Your employees may be the key to letting a cyber attack reach your company. How can you create a culture of safety without coming across as a fatalist?
  • Forming an Incident Response Team (IRT) – Incident response is an approach to addressing and managing the aftermath of a security breach or attack. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. In this session learn about the roles of an IRT, how you go about forming one and how to get upper management buy in.

$65/person, second person from same company is $40.

Nov 17, 2017
Threat on Your Doorstep: Cybersecurity for Executives
BGSU at Levis Commons

Join Bowling Green State University and Michigan Cyber Range for a FREE cybersecurity workshop!

“Threat on Your Doorstep” provides an in-depth analysis of the current threat landscape that ensures your organization is prepared to address cybersecurity incidents and threats.

With the guidance of instructor Dr. Joe Adams, participants will explore topics such as phishing, cyber terrorism, social engineering, incident response, hacking and more.

Deadline to RSVP is November 1, 2017.

Jan 10
Toledo Web Professionals - The Cybersecurity Roadshow with Tom Germain
Seed Coworking

This traveling cybersecurity workshop seeks to bring cybersecurity awareness to creators, developers, and businesses.

You've read the headlines about the latest hack affecting millions of web users and/or credit card holders, but did you know that, possibly and unwittingly, your own website, router or web connected device could be part of a botnet used in attacks?

What never ceases to amaze is how many businesses and individuals fail to protect themselves from the hordes of hackers working in a multi-billion dollar a year illegal industry. This workshop aims to awaken you to the many dangers as well as to offer real solutions to defending yourself and your business from what could be a disastrous breach of security.

• Profile of a "black hat" hacker and what they target

• Types of attacks and how they're achieved

• Legal aspects (liability, etc.)

• Social engineering

• Sources of timely security alerts

• Basic prevention

• Penetration testing

• Web site and web server security

• Desktop and Mobile security

• Anti-virus products comparisons

Truthfully, everybody who connects to the Internet should know this stuff, so come on over, and become a more savvy, secure, and responsible Internet user!

About Stuart Budden Stuart Budden is an IT professional, co-owner and CEO of Nivsys Inc, and a professor teaching cyber security at Fanshawe College, in London, Ontario.

About Tom Germain Tom Germain is CEO of Coder Scoop Inc., a web and mobile development company in London, who has long concerned himself with security on behalf of his clients and started this workshop in May of 2017.

Mar 14
Best Practices for API-Driven React Applications with Scott Radcliff
Seed Coworking

React is on fire! Companies around the world are trying to take advantage of the way React makes web applications fast, responsive, and easier to develop. That said, what about the API? If your API is slow or not optimized, that could severely effect your cool new React app and end up as the choke point for negative customer experiences.

In this talk, we'll build a React app that is driven by an API written in Rails, though we'll cover a great deal of best practices, examples, and considerations that can be applied to a client-server architecture written in any language.

You'll leave this talk with an understanding of the APIs role in React applications, things to look for when working with or building an API, and practical knowledge to take back into your workplace or personal projects.

Speaker Bio: Scott Radcliff is an expert software developer in the Toledo area. He's built web applications using numerous programming languages and technology stacks accomplishing a variety of tasks from the very simple to enterprise-grade. He enjoys building applications that help people do things that they previously couldn't, and he loves Ruby.

Scott is a freelance developer and is currently taking on new customers.