MEMBER’S AREAJOIN

Events

Webinar: Navigating the Evolving Landscape of Cybersecurity - CMMC Updates and the Implications of Generative AI

  📅 Add to calendar

In today’s rapidly evolving digital landscape, cybersecurity remains a paramount concern for manufacturers. This presentation will delve into two critical areas shaping the future of cybersecurity and critical for manufacturers to understand: the latest updates to the Cybersecurity Maturity Model Certification (CMMC) and the emerging implications of generative AI technologies.

  1. CMMC Update: The CMMC framework has undergone significant revisions aimed at enhancing the cybersecurity posture of defense contractors. This section will provide an overview of the latest updates, including changes in certification levels, assessment processes, and compliance requirements. Attendees will gain insights into how these updates impact their cybersecurity strategies and what steps they need to take to achieve and maintain compliance.
  2. Cybersecurity Implications of Generative AI: Generative AI, with its ability to create content and simulate human-like interactions, presents both opportunities and challenges for cybersecurity. This section will explore the dual-edged nature of generative AI, examining how it can be leveraged to enhance security measures, such as threat detection and response, while also addressing the potential risks it poses, including the creation of sophisticated phishing attacks and deepfakes. Attendees will learn about the latest advancements in generative AI and strategies to mitigate associated cybersecurity risks.

By the end of this presentation manufacturers will be better equipped to navigate these complex and dynamic areas effectively.

Tom Wojcinski is a partner in Wipfli’s cybersecurity and technology management practice. He specializes in helping organizations reduce and manage the risks to modern technology and information systems. In today’s business environment, customers, trading partners, regulators and employees expect continuously available and secure information systems. To help meet this expectation, Tom works with clients to increase the security, availability, and recoverability of their information assets.

Tom leads a variety of engagements designed to help improve organizations’ cybersecurity posture, including cybersecurity risk assessment, control program development and implementation, incident response planning and simulation, vulnerability and penetration testing, security audit, control verification, and managed security services.  He is a frequent author and speaker on cybersecurity and information technology (IT) risk management topics.
 

For more information and to register:
https://us06web.zoom.us/meeting/register/tZctdeCgpjoqHdY6hdqNdxvasmc3yDgyn20M

← Return to Events