Loading Events

« All Events

Utility University: Navigating cybersecurity in 2024: Trends, controls and mitigating attacks

Baker Tilly CPE Webinars

October 16 @ 1:00 pm 2:00 pm EDT

Free 1 CPE credit

The cybersecurity landscape is evolving, and it can feel like your organization is on the defense keeping up with the latest cyber risks, regulations and emerging trends. As we’re seeing in recent headlines, even the most established organizations are subject to cybersecurity attacks. While sophisticated hacking is a valid threat, it’s rarely the root cause of a data breach. To mitigate risk, you must understand your organization’s unique vulnerabilities, cybersecurity processes and controls. 

Baker Tilly’s cybersecurity specialists have spent that past year collecting and observing key trends shaping the cybersecurity environment. Now is a good time to review your organization’s controls and assess what improvements can be made to protect your information and the value of your organization. Join us for a webinar for a full breakdown of what organizations need to know about trending risks and how to mitigate them.

Learning objectives

  • Discuss the hottest cyber topics, including social engineering attacks, malware and ransomware attacks, artificial intelligence and machine learning (AL/ML) attacks, cloud security threats and fourth-party attacks
  • Review results of vulnerability scanning and penetration testing and how they can identify misconfigurations and weaknesses to allow you to patch and remediate findings 
  • Examine cybersecurity program insights from the field through our IT audits, including updated regulatory guidance, Managed Service Providers (MSPs) model challenges and other key elements of the cyber landscape

Presenters

Christopher Tait, MBA, CISA, CCSK, CFSA | Principal, Baker Tilly

Madhu Maganti, CPA, CISA, M.S. | Principal, Baker Tilly

Who should attend

Leadership and professionals from municipal utilities, public utility districts, tribal utility authorities, and state, local and tribal governments responsible for information technology and cybersecurity functions, along with those charged with governance and oversight of those functions

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.