{"id":17446,"date":"2026-02-26T09:52:13","date_gmt":"2026-02-26T14:52:13","guid":{"rendered":"https:\/\/ndisac.org\/dibscc\/?post_type=tribe_events&#038;p=17446"},"modified":"2026-02-26T09:52:13","modified_gmt":"2026-02-26T14:52:13","slug":"cdse-understanding-basic-malware","status":"publish","type":"tribe_events","link":"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/","title":{"rendered":"CDSE &#8211; Understanding Basic Malware"},"content":{"rendered":"<pre>This introductory webinar examines the current malware landscape, identifying the seven most prevalent threats facing digital environments. Grounded in NIST standards, the presentation moves beyond basic terminology to cover specific attack mechanisms, essential defensive controls, and the official framework for incident response.\r\n\r\nAgenda:\r\nDefining Malware: Official definitions and the \"Big 7\" threat classifications.\r\nAttack Vectors: Vulnerabilities, phishing, and bundling.\r\nPrevention: Seven core strategies to harden devices and accounts.\r\nIncident Response: Applying the NIST CSF 2.0 model (Detect, Respond, Recover).<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>This introductory webinar examines the current malware landscape, identifying the seven most prevalent threats facing digital environments. Grounded in NIST standards, the presentation moves beyond basic terminology to cover specific [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_tribe_events_status":"","_tribe_events_status_reason":"","footnotes":""},"tags":[],"tribe_events_cat":[],"class_list":["post-17446","tribe_events","type-tribe_events","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CDSE - Understanding Basic Malware - DIB SCC CyberAssist<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CDSE - Understanding Basic Malware - DIB SCC CyberAssist\" \/>\n<meta property=\"og:description\" content=\"This introductory webinar examines the current malware landscape, identifying the seven most prevalent threats facing digital environments. Grounded in NIST standards, the presentation moves beyond basic terminology to cover specific [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"DIB SCC CyberAssist\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/\",\"url\":\"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/\",\"name\":\"CDSE - Understanding Basic Malware - DIB SCC CyberAssist\",\"isPartOf\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\"},\"datePublished\":\"2026-02-26T14:52:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ndisac.org\/dibscc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Events\",\"item\":\"https:\/\/ndisac.org\/dibscc\/events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"CDSE &#8211; Understanding Basic Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ndisac.org\/dibscc\/#website\",\"url\":\"https:\/\/ndisac.org\/dibscc\/\",\"name\":\"DIB SCC CyberAssist\",\"description\":\"Cybersecurity Resources for DIB companies and suppliers\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CDSE - Understanding Basic Malware - DIB SCC CyberAssist","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"CDSE - Understanding Basic Malware - DIB SCC CyberAssist","og_description":"This introductory webinar examines the current malware landscape, identifying the seven most prevalent threats facing digital environments. Grounded in NIST standards, the presentation moves beyond basic terminology to cover specific [&hellip;]","og_url":"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/","og_site_name":"DIB SCC CyberAssist","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/","url":"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/","name":"CDSE - Understanding Basic Malware - DIB SCC CyberAssist","isPartOf":{"@id":"https:\/\/ndisac.org\/dibscc\/#website"},"datePublished":"2026-02-26T14:52:13+00:00","breadcrumb":{"@id":"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ndisac.org\/dibscc\/events\/cdse-understanding-basic-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ndisac.org\/dibscc\/"},{"@type":"ListItem","position":2,"name":"Events","item":"https:\/\/ndisac.org\/dibscc\/events\/"},{"@type":"ListItem","position":3,"name":"CDSE &#8211; Understanding Basic Malware"}]},{"@type":"WebSite","@id":"https:\/\/ndisac.org\/dibscc\/#website","url":"https:\/\/ndisac.org\/dibscc\/","name":"DIB SCC CyberAssist","description":"Cybersecurity Resources for DIB companies and suppliers","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ndisac.org\/dibscc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/17446"}],"collection":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events"}],"about":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/types\/tribe_events"}],"author":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/comments?post=17446"}],"version-history":[{"count":1,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/17446\/revisions"}],"predecessor-version":[{"id":17448,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events\/17446\/revisions\/17448"}],"wp:attachment":[{"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/media?parent=17446"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tags?post=17446"},{"taxonomy":"tribe_events_cat","embeddable":true,"href":"https:\/\/ndisac.org\/dibscc\/wp-json\/wp\/v2\/tribe_events_cat?post=17446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}