M.A. Polce is offering a FREE cybersecurity event for executives Tuesday, December 3rd from 11:00 a.m. – 1:30 p.m at Delta Hotels by Marriott Utica. This Cisco Sponsored event includes lunch and will help you to better understand frameworks and best practices for managing cybersecurity-related risk. Register to reserve your seat here:  https://mapolce.com/cybersecurity-for-executives/


With cybercrime growing exponentially, mitigating risk is everyone’s responsibility, not just your Chief Information Security Officer (CISO) or the head of your IT department. Creating a culture of awareness and behavior within your organization requires the active participation of non-technical management and leadership. It is important that you, as a non-technical leader or executive in your company, understand frameworks and best practices for managing cybersecurity-related risk. It is just as important for you to understand that you are more often the target and potentially, the weakest link in your company’s overall cyber security posture.


Many industries have regulations they must meet in order to address cyber security—we call these “Big C” compliance, and they include regulations like HIPAA, GLBA, FFIEC, NERC, and PCI-DSS. It’s important to note, however, that just meeting regulations doesn’t necessarily make a company secure. Companies should consider these regulations a subset of their overall security program, rather than the only requirement for it. To do this, they must focus on “Little C” compliance—or the internal requirements, i.e. policies and procedures, that executives in a company support to make their company secure. This compliance, driven internally, should line up with the business requirements and protect the assets that are important to your company, regardless of whether it is mandated by a government agency or not.


This session covers predominant areas of information security that all executives should be familiar with in the day to day running of their business, such as:

  • Risk Management
  • Avoiding Reputational Damage
  • Securing the Supply Chain
  • Employee Awareness / Behavior


Most importantly, this session will help you to understand where to begin by introducing a framework that will provide a smaller, prioritized number of actionable controls that should be implemented first to yield immediate results. These critical security controls are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks.


Rather than implementing dozens of controls, this prioritized approach will help your organization focus on what’s important first to establish a baseline for protection and cyber defense.

To submit news for our Member News section of our website and to be included in our weekly Member Mentions email, please send a press release, logo and any relevant photos to officeadmin (at) greateruticachamber.org. PLEASE NOTE: Any news sent by Friday will be included in the following Wednesday’s Member Mentions. We will include one mention per member per week.  Thanks for your understanding!
If you’re not on our mailing list or receiving Member Mentions, please click here to sign up.