CISA invites you to join the awareness webinar, “Cover Your Assets: Securing Critical and High-Value Assets (July)” on Thursday, July 22, 2021. We are excited to share this information with staff from across Federal, state, and local government, critical infrastructure stakeholders, and more.
Think about your organization’s most critical functions: what do others depend on you to provide? Your high-value assets (HVAs), also known as critical assets across many industries, are the information or information systems that have serious impact to your organization’s ability to conduct its mission or business operations if lost, corrupted, or inaccessible. Across sectors and industries, data and information systems that underpin core business and operational functions- or those systems that connect to core functionalities- make highly tempting targets for sophisticated criminal, politically motivated, or state-sponsored actors to exploit directly or compromise to undermine public trust.
The HVA program was established by CISA to help organizations gain a comprehensive understanding of the risks that dynamic threat actors pose, and identify the high-value information and systems that are likely targets.
This webinar provides an overview of the following key information and more:
• HVA and critical asset overview: Define high-value assets, and how to assess and prioritize risks.
• Common threats: Understand the most likely threats to HVAs and how to mitigate associated vulnerabilities.
• CISA guidance: Learn the steps and parameters to identify, categorize, prioritize, and secure your HVAs or critical assets.
• Case studies: Explore the impacts of documented critical or high-value asset cyberattacks, and the success of resulting response and recovery efforts.
This course is accessible to a non-technical audience including managers and business leaders, and provides an organizational perspective useful to technical specialists. Participants can request 1 CPE credit for this course.
Would you like for your event to be displayed on the events calendar? Submit cybersecurity related events using our event submission form.