about-me variable
IJIS Institute invites you to their webinar

Cyberthreat Landscape Introductory Webinar - Presented by IJIS and 5thColumn

About this webinar

The digital world is different from that of the physical. It's much easier for a threat actor online to surveil and infiltrate your virtual infrastructure than it would be to penetrate a physical location. There are many ways we often unknowingly leave our virtual backdoors wide open. The exploitation of vulnerable web and mobile applications is one of the most common entry points for a cybercriminal. That's why it is critical to stay vigilant and adhere to industry standards to ensure your agency/company's cyber defenses aren't lacking.

The IJIS Institute now offers a standards-based vulnerability scanner as part of the Springboard Certification program. CyberStandardsCheck (CSC) is a turnkey vulnerability scanner that instantly identifies bugs in web and mobile applications with easy to understand recommendations on how to fix them. CSC even integrates with JIRA to ensure those bugs are assigned and dealt with before it is too late.

Join IJIS and representatives from 5thColumn for an informative webinar to discuss the importance of threat and risk management for ALL entities in both the public and private sectors. This webinar will include a sample of the devastation cybersecurity can wreak through first-hand experiences of those who have dealt with a cyber breach, discussing the importance of adhering to standards frameworks to stay safe and compliant, and a high-level demo of the CyberStandardsCheck tool.

This introductory webinar is the first of a four-part series on threat and risk management through this essential tool.

Hosted by

  • Guest speaker
    G
    Raymond Hicks Founder / Innovation Officer @ 5thColumn

  • Guest speaker
    G
    Nils Lindokken Business Development @ 5thColumn

  • Guest speaker
    G
    Ashwini Jarral

IJIS Institute

Working together to create solutions.

The IJIS Institute is a nonprofit alliance working to promote and enable technology in the public sector and expand the use of information to maximize safety, efficiency, and productivity.