Webinar

What's Your T-Shirt Size? How to Rightsize Your Cybersecurity Strategy to Your IT Resources

Sep. 28, 2022 , 1:00 pm – 2:00 pm
Contact Rita Reynolds (202) 942-4248
  • Event

    What's Your T-Shirt Size? How to Rightsize Your Cybersecurity Strategy to Your IT Resources

    At this point, it’s no secret that cybersecurity is a top priority for all counties – a priority that takes significant IT resources and expertise to improve. But available IT resources vary widely whether you are a small, medium, or large county. Some larger counties have an entire IT department with a dedicated cyber team looking for more advanced projects, while smaller counties may have no IT staff and need guidance on where to start.   

    So how do you rightsize your cybersecurity strategy? Join this live webinar to develop a tactical checklist for rightsizing your cyber strategy to the IT resources you have.  

    Based on your “T-shirt” size, our panel will discuss:  

    • How to adjust your cyber expectations, roadmap, and costs
    • Tactical steps to achieving the greatest possible cyber risk reduction
    • Effectively implementing multi-factor authentication (MFA)         
    • Considerations for when you’re looking for new cyber solutions 
    At this point, it’s no secret that cybersecurity is a top priority for all counties – a priority that takes significant IT resources and expertise to improve.
    2022-09-28
    Webinar
    2023-04-12

At this point, it’s no secret that cybersecurity is a top priority for all counties – a priority that takes significant IT resources and expertise to improve. But available IT resources vary widely whether you are a small, medium, or large county. Some larger counties have an entire IT department with a dedicated cyber team looking for more advanced projects, while smaller counties may have no IT staff and need guidance on where to start.   

So how do you rightsize your cybersecurity strategy? Join this live webinar to develop a tactical checklist for rightsizing your cyber strategy to the IT resources you have.  

Based on your “T-shirt” size, our panel will discuss:  

  • How to adjust your cyber expectations, roadmap, and costs
  • Tactical steps to achieving the greatest possible cyber risk reduction
  • Effectively implementing multi-factor authentication (MFA)         
  • Considerations for when you’re looking for new cyber solutions