• Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

Call us! 210-458-2119

CIAS@UTSA.edu
CIAS ISAOCIAS ISAO
  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website

Webinar Recordings

Home Webinar Recordings

Building an Incident Response Plan

Do you have a plan to minimize threat damage, including data loss, abuse of resources and loss of trust?

Jeffrey Reich

Incident Response Plans are critical to an organization’s ability to minimize damage caused by threats, including data loss, abuse of resources and loss of trust. Many laws, regulations or cyber-insurance providers require organizations to implement and exercise Incident Response Plans. A well-designed plan ensures a prepared approach to mitigate impacts on your organization’s critical business services.

After the webinar, you will be able to:

Specify the most important questions to ask and answer for your organization
Identify who should be engaged in incident response and when
Recognize common pitfalls in incident response planning
Get your organization’s Incident Response planning underway

Jeffrey Reich, a senior information security instructor with the CIAS, holds a CISSP certification from (ISC)2, CRISC certification from ISACA, and was granted a Foundation Certificate in IT Service Management from The Council for Service Management Education and The Information Systems Examination Board.

Get the slides

June 28, 2022

Introduction to the CISA Incident Reporting System

A walkthrough of CISA's tool to collect and share incident data

Jeremy West

The CISA Incident Report System assists analysts in providing timely handling of security incidents, improved analysis and potentially assistance with incident response. The value of this system isn’t just limited to reporting incident information to CISA (which is an operational component of the Department of Homeland Security), but it also serves as a model for collecting and sharing incident information — both internally and externally.
You can also find the referenced template here: Information Sharing Report

Get the slides

March 8, 2022

No Cost Tools to Monitor and Secure Your IT Infrastructure

Free Tools To Scan Ports, Watch Network Traffic, and Catch Breaches In Your Network

Dwayne Williams

In this one-hour webinar, the CIAS-ISAO Associate Director of Technology, Research and Competitions, shares insights into no cost tools that can help monitor and secure your IT infrastructure. Tools discussed include Nmap, Log Consolidation Tools, Wireshark and Sysinternals Suite.

This presentation describes how these tools work; their unique and often overlooked capabilities; and how they can be used in critical IT/cybersecurity tasks.

Get the slides

October 26, 2021

Cybersecurity Policies

The Tools You Need To Get Started With Cybersecurity Policies

Natalie Sjelin

Organizations are exposed to new cybersecurity risks every day. Cyberattacks and data breaches impact all organizations, large and small, which means you want to make sure everyone associated with your business understands their role in protecting the organization’s IT assets, sensitive information and reputation. Cybersecurity policies explain how employees, consultants, partners, board members and other end-users can assist in defending the organization from cyber incidents.

In this one-hour webinar, CIAS-ISAO Director of Training Natalie Sjelin shares strategies for developing effective cybersecurity policies; discusses how to overcome implementation challenges; describes critical cybersecurity policies your organization should address; and provides resources, templates and guidelines you can use to develop effective security policies.

Get the slides

May 25, 2021

Continuity Planning

What, Why, and How

Gregory B. White, Ph.D.

Today, there are any number of events that could cause a disruption or even a complete shutdown of an organization’s operations. Should this occur, what would be the impact to your organization? Organizations, both public and private, need to be prepared to address a disruption to operations, whether it is due to a natural disaster, terrorist event or cyber incident. One of the first things that should be done to prepare is to develop a continuity plan that can be put into action when a disruption occurs.

CIAS-ISAO Executive Director, Dr. Greg White, explained what continuity plans are, why one is needed, the different types of plans and how to get started.

Get the slides

April 6, 2021

New: The CIAS Community Cybersecurity Clinic Check it out
CIAS ISAO
  • Facebook
  • LinkedIn
  • X
  • Twitter
  • The Crucial Function of Cybersecurity Policies in Organizations
  • A Roadmap to Developing Your Community Cybersecurity Program
  • Collaboration and Consensus: Using the MITRE ATT&CK Framework
  • Introducing Alan CyBear, the Smokey of Cybersecurity
  • Think like a Hacker, a Defense Strategy
  • Engaging your Leadership in Cybersecurity

© 2026 UTSA Center for Infrastructure Assurance & Security -- CIAS-ISAO powered by

  • Blog
  • Membership
    • Level I
      • 1 Initial Consultation on ISAO development
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
    • Level II
      • 5 Consultations, customized (cyber program)
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized Training Resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity Prep Courses
      • Webinar Recordings
    • Level III
      • 10 Consultations, tailored to you
      • C4 Clinic
      • ISAO Standards Documents
      • DHS/FEMA Training: No Cost Cybersecurity Courses
      • ISAO Awareness: No Cost Resources
      • K-12 Cybersecurity Education
      • Customized training resources
      • Roadmap to Establishing an ISAO
      • Discount on Cybersecurity prep courses
      • Webinar Recordings
      • Panoply (virtual cyber competition)
  • Our Model
  • Answers
  • About
    • About CIAS-ISAO
    • Contact
    • CIAS website