Skip to Content

Cybersecurity for the public sector: You've been hacked — now what?

Presented By:
Alex Brown Colin Taggart
February 19, 2018
View on-demand

Cyberattacks often target the public sector. This three part on-demand webinar series will help you boost your cybersecurity efforts by figuring out where to start after a data breach, determine how it happened, and how to protect your organization for the future.

A man frustrated while looking at his desktop computer.

Ransomware. Confidential information leaks. Phishing attacks. Cybersecurity for the public sector is a growing need and educational institutions can’t afford to suffer costly cyberattacks and data breaches.

Why is the public sector targeted?

Cyber criminals are constantly victimizing organizations and governments — particularly educational institutions — are key targets. Here are a couple reasons why:

  • IT is commonly decentralized, which makes threat intelligence coordination and consistent security control implementation very difficult.
  • Security funding budgets are typically limited and networks are more open to serve end users, including increased reliance on BYOD (bring your own device).
  • Public organizations also have plenty of confidential data available that hackers enjoy compromising.

Three part cybersecurity webinar

With plenty of information at risk, organizations must ask themselves, “What do we do when (not if) we’re hacked?” This three part on-demand webinar series will help you figure out where to start after a data breach, determine how it happened, and protect your organization from cyberattacks in the future.

  1. Incident response triage: Where do you start? – You've been hacked. You're in crisis mode. What's the first thing you need to do? In this beginning webinar, our experts will discuss the necessary actions required immediately after a cyber-attack.
  2. Incident evaluation: How did this happen? – After responding to initial triage, you must consider how the hacker was able to breach your systems. During this webinar, our experts will walk through the stages of event detection and vulnerability/risk assessment.
  3. Incident prevention: How do you protect your organization? – In this closing webinar, you'll learn best practices and common oversights organizations make in regards to information security and how to protect your organization.

Related Thinking

Image of lock and person on computer
June 14, 2017

Cybersecurity is like a sponge: Five ways to safeguard your data

Article 4 min read
A picture of a man sitting at a desk who is worried and suspects fraud.
July 6, 2023

Suspect fraud? Seven actions to take now

Article 3 min read
Image of a digital LED wall
November 17, 2022

Seven-point cybersecurity assessment: Identify your organization’s digital risks

Article 3 min read