Join us for our 2nd Annual Cybersecurity Summit for Small Businesses! Don’t miss interactive sessions for all levels of business and all industries throughout the day. Choose from a track that best fits your needs. Throw out the intimidation—the summit is meant to educate and support your business and questions. Leave with takeaways to immediately implement in your business. You will also have the opportunity to hear from two nationally-recognized keynote speakers, access to cybersecurity consultants for free one-on-one consulting and a host of cyber for small business resources and exhibitors. Your registration also includes a continental breakfast, boxed lunch and happy hour hors d’oeuvres.
This event sold out last year—don’t wait to get your tickets!
7:30-8:00 am — Registration, Networking & Breakfast
8:00-8:25 am — Welcome & Opening Remarks
Aikta Marcoulier | Executive Director, Pikes Peak SBDC & Cyber: CYA Program Manager
8:25-8:50 am — Important of Local & National Collaboration
Stan VanderWerf | El Paso County Commissioner
9:05-10:35 am — Breakout Sessions #1
Colorado Springs accounts for a diverse cybersecurity ecosystem. From cutting edge technology providers to small business education and workforce development, there’s always a lot going on. This panel event will focus on the latest in community initiatives and collaboration in cybersecurity.
Moderated by Vinnie Persichetti | Cybersecurity Programs Director, Colorado Springs Chamber & EDC
- Gretchen Bliss | Pikes Peak Community College, Cybersecurity Director
- Rick White | Interim Director, UCCS Cybersecurity Programs
- Abe Thompson | Campus Director, SecureSet.
- Ernie Campos | President, Information Systems Security Association (ISSA) Chapter President
- Forrest Senti | Director of Business and Government Initiatives, National Cybersecurity Center (NCC)
Small business are the most vulnerable to cyber threats, data loss, data theft and so much more. The cost of recovery is high. In fact 60% of businesses who experience any such devastation go out of business in the first year. Damages due cyber threats or data loss are not covered by traditional liability or property policies. Cyber insurance is the only coverage that protects you and the costs for recovery. In this workshop you will hear, from the legal perspective, the important of having cyber insurance and the impacts on business if it is missing from your currently policy.
Presented by Tom Dougherty, Partner, Lewis Brisbois Intellectual Property & Technology
The National Institute of Standards and Technology (NIST) is a non-regulatory government agency that develops technology, metrics, and standards to drive innovation and economic competitiveness at U.S.-based organizations in the science and technology industry. NIST Special Publication (SP) 800-171, governs Controlled Unclassified Information (CUI) in Non-Federal Information Systems and Organizations. Compliance helps the federal government to perform its designated missions and business operations successfully.
As a government contractor whether you’re the Prime or a Subcontractor, you need to protect your network and that of any Prime Government Contractor. How prepared are you for the NIST SP 800-171 compliance?
Presented by Corvus Technologies LLC
- Coryn Mann, Owner & Principle Subcontracts Manager
- Eric Mann, Co-Owner & Principle Security Consultant
Finding cybersecurity solutions for your small business does not always need to break the bank. In this workshop you will learn about small business friendly management tools to manage your cyber risk! Take away a list of easy solutions to implement within your small business.
Presented by Mike Crandall | CEO Digital Beachhead & Soteric Group Consultant
10:35-10:50 am — Break/Snacks
10:50-12:20 pm — Breakout Sessions #2
You may think cyber attacks only happen to the corporate giants. But as a small business owner, you are actually more at risk than all of them! The issue of cybersecurity has become a central focus of companies, big and small, across all industries. As more individuals and small businesses become increasingly dependent on our networked and interconnected infrastructure, cybercrime and cyber criminals have become much more sophisticated in their techniques for stealing identities and using them to extract funds and make fraudulent purchases. Join us in this session to understand how your small business may be at risk and what you can do to protect your customers and your assets.
Presented by Rodney Gullatte Jr., Certified CISO, CEH and Owner, Firma IT Solutions & Services
Did you know that HB 18-1128 is the latest in Colorado legislation that specifies exactly what kind of personal data companies need to track? Colorado has one of the most strict laws that small businesses need to abide with…and if you don’t, there can be strict penalties. If you are doing business with other states…or if they are doing business with you, there are national cyber regulations you need to be aware of. This workshop will provide an overview of the latest in regulations and help you understand how to navigate them and stay in compliance.
Presented by Tom Dougherty, Partner, Lewis Brisbois Intellectual Property & Technology
The world has become a much smaller place! Many small businesses in various industries are now selling products and services to international customers worldwide. If the business markets directly to a citizen out side of the United States, they may have to consider additional laws or regulations that have to be complied with. For a small business owner, this can become overwhelming!
This workshop will look at the most significant cybersecurity and privacy laws that small business owners may come into contact with. We will look at laws in Canada, Europe and other parts of the world. We’ll discuss laws like Privacy Shield, GDPR and other safe harbor laws that may apply.
The speaker is a SBDC Cyber Consultant and is well versed in cybersecurity and privacy law. He travels internationally and helps organizations solve complex problems related to cyber and privacy governance issues.
Presented by Presented by Dr. Shawn Murray, C|CISO, CISSP, CRISC, FITSP-A. President, Chief Academic Officer, Cybersecurity Professional, CISO, Murray Security Services & Consulting
This workshop is designed to illustrate how the shift in real time collaboration is complemented with new compliance. We will discuss how the collaboration software was built to support these compliancy features. We will explore the demarcation points of software to best use the 365 offerings.
Presented by Ken Thibodeaux | Business Sales Specialist, Microsoft
12:20-1:15 pm — Lunch
1:15-2:00 pm — Lunch Keynote
Daniel Eliot | Director of Small Business Programs, National Cyber Security Alliance
2:00-2:15 pm — Brain Break!
2:15-3:45 pm — Breakout Sessions #3
Cyberpsychology is an emerging field that explores the psychological and emotional aspects of cybersecurity. This talk addresses the problem that we have ignored the psychology behind cyber security. This talk presents compelling findings from 3 post-doctorate studies, totaling over 5,000 research participants. Furthermore, this talk covers the science of the human mind in a cyber environment. In a cyber war limbic system in a person does not operate
in a "fight or flight" manner. This requires people to be able to deductively reason through a cyber war. It has been noted that the human is the most vulnerable asset in any network. Unlike computers people respond to propaganda and emotional responses. Criminals have found ways to tap into those responses and get victims to react how they want. This talk explores the commonalities of cyber victims founded on cybersecurity and criminology research.
Presented by Dr. Erik Huffman, Founder & CEO, Handshake Leadership
Mark Spencer, Cybersecurity Consultant to the SBDC, will discuss how to select a good cybersecurity company to help you meet the needs of your organization. Mark will walk you through the selection process to “right-size” your selection.
Presented by Mark Spencer
Employee and vendor error are the largest source of breaches for small business. Many times, the breach comes from non-issued business devices, lack of data security, and willingness to share valuable data. Simple small business errors can lead to big nightmares!
While educating your employees and vendors on cybersecurity is important, implementing the right policies with your employees and agreements with your vendors are even more vital. In this workshop, you will hear, from a legal perspective, how your small business can implement simple policies and agreements to security your business and client data.
Jon Olafson, Partner, Lewis Brisbois, Labor & Employment
New directions in blockchain provide a built-in visibility to how the overall marketplace is managed so that small businesses participating can ensure they will be treated fairly. Business as small as a coffee shop can be empowered to compete on equal ground with established mega vendors. These new tools will transform small business by providing visibility to their history of service allowing comparisons and verification of anonymous participants. Participating companies will build their value through their business practices over time allowing them to display trust of their existing customer base to online customers worldwide. With the ability to verify trust for the first-time boutique service and product providers will be able to display quality for their unique products. Mom and Pop business models can set themselves apart from competition and provide their trusted brands in global markets without relying on mega retail platforms which cut into their profits.
Presented by Chris Gorog, MBA, PMP, CISSP, CTO at BlockFrame Inc., Author, Professor, Host of Top Followed Online Cyber Security Show "New Cyber Frontier"
4:00-5:00 pm — Happy Hour Fireside Chat
Maria Roat | Chief Information Officer, U.S. Small Business Administration (Washington D.C.)
5:00-6:30 pm — Happy Hour/Networking Reception
- Colorado Springs Chamber & EDC
- CTO Blockframe
- Microsoft 365
- Small Business Administration
- Spark Mindset
Small business resources
Breakfast, lunch and networking reception
One (1) 6' exhibitor booth (skirted), two chairs
Company name, description in event program
Five (5) admissions to the event