General

Kahoot! Quiz games

Jessie Wachter

WaTech’s Office of Cybersecurity will host a cybersecurity quiz competition on Microsoft Teams each week. Your host, Jessie Wachter, will be on hand to guide players through the quiz and answer questions at the end.

Ralph Johnson: Closing Remarks

 

Description

Throughout the month, we've been inspired by informative presentations and engaging events that armed us with the tools and knowledge to stay safe online. Join Ralph Johnson as he walks us through the key takeaways, memorable moments, and important lessons that will help us continue our cybersecurity journey.

 

Ian Moore: Cyber Ghost Stories and other things that keep us awake at night

 

Descriptions

“Cyber-attacks are what nightmares are made of, at least for security professionals and executives.  We lose sleep worrying about our employees clicking on links or attachments and our network becoming infected.  We do whatever our budget can handle and we perform tasks for the level of skill and understanding that we have.  No organization is perfect, regardless of their budget and skillset. 

 

The Importance of a Enterprise IT Security Strategic Plan

  

Description

The panel discussion for the State of Washington Enterprise IT Security Strategic Plan will examine the purpose and development of this initiative, focusing on the challenges state agencies face in an evolving cybersecurity landscape. Insights from recent state agency workshops will be shared, covering key goal areas and emerging themes. Although the plan is still in development, the discussion will explore ideas to enhance cybersecurity resilience, align with state IT priorities, and address changing security threats.

Randy Holt - 10 Ways to Protect Your Home Network

 

Description

In today’s world, a single household might have an extensive range of wireless devices from computers and smartphones to TVs and smart appliances. Being connected is great, but it’s vital to protect your network. You can have your private information stolen if someone accesses your WIFI. Hackers can even perform illegal activities through your connection, leaving you responsible.