Virtual Event | Zoom

If you are having trouble registering for the webinar or need technical assistance in accessing the Zoom platform, please email nacomeetings@naco.org.

October 31, 2023 

As cyber extortion, including ransomware, continues to impact virtually every sector, and threat actors increase their extortion demands, the need for an effective incident response (IR) plan becomes more imperative. After over 20 years of incident response, Sylint has developed an IR program that helps counties respond to and recover from cyber extortion incidents. This webinar will cover the 7 crucial steps to address these incidents and provide a framework to minimize downtime, reduce impact, and enable continuity.

On Demand Content

Related News

Image of GettyImages-1355381242.jpg
Advocacy

Senate Rules Committee considers elections and AI legislation ahead of 2024 General Elections

Senate Rules Committee held business meeting on May 15 to markup and consider legislation on the role of artificial intelligence in elections.

Image of GettyImages-1281545908.jpg
Advocacy

U.S. Senate eyes funding the Affordable Connectivity Program through broader telecommunications package

The ACP is under a short timeline to receive additional funding. After May 31, all 23 million enrolled households will cease to receive any benefit from the program. Several Senate proposals could lead to expedited passage of funding to save the program.

US Capitol side
Advocacy

Congressional leaders introduce new legislation for a national data privacy framework

On April 7, U.S. House Energy and Commerce Committee Chair Cathy McMorris Rodgers (R-Wash.) and U.S. Senate Commerce, Science and Transportation Committee Chair Maria Cantwell (D-Wash.) introduced the American Privacy Rights Act. 

1466091682
Advocacy

DOJ issues final rule for state and local governments to implement web-based accessibility standards

On April 8, the U.S. Department of Justice (DOJ) announced the release of a web accessibility final rule for state and local governments. 

Internet router
Advocacy

Congress deliberates the future of the Affordable Connectivity Program

On January 10, the bipartisan Affordable Connectivity Program Extension Act of 2024 was introduced in the U.S. House of Representatives. 

Communication cables
Advocacy

Bureau of Land Management updates regulations for broadband infrastructure development on federal public lands

The BLM published a final rule to update regulations for developing and operating broadband infrastructure on public lands.

Upcoming Events

Coding with a lock
Webinar

How to Deliver a County AI Idea Hackathon

One collaborative strategy in prioritizing and evaluating AI Use-Cases is to hold an AI Hackathon. During this webinar, you will hear from Alameda County, California, and King County, Washington, on how they have taken this approach. The concept, along with steps for preparing and for delivering the Hackathon, will be shared. Tips on how to engage partner and county wide staff will also be covered.

Two people look at a computer together
Webinar

Doing More with Less: Sustaining the County Government Workforce with Artificial Intelligence

Today’s county government landscape is at a pivotal juncture, with artificial intelligence (AI), machine learning, and big data technologies spearheading a revolutionary shift. A transformation is essential in an era where service delivery, technological advancements, and evolving workforce dynamics intersect. Amidst these challenges lies a critical question: How can county governments efficiently serve their communities with fewer resources while meeting the increasing expectations of today’s public?

A group of business people shake hands
Webinar

NACo Cyberattack Simulation: Supplier Management Access

Effective partner management is integral to the operational efficiency of government business, yet it poses inherent cybersecurity risks, especially concerning partner access to sensitive systems and data.

Woman looking at her credit card
Webinar

NACo Cyberattack Simulation: Financial Access

Financial transaction systems are prime targets for cyber threats due to the value and sensitivity of the data. This cyber simulation assesses risks and fortifies safeguards within financial access systems.

lines of data with a lock
Webinar

NACo Cyberattack Simulation: Cloud Security

Cloud computing has become integral to modern business and government operations, offering scalability, flexibility, and efficiency.