Navigating Bill 194 Webinar
LCM and Fortinet will be hosting two webinars that will discuss how to navigate Bill 194: On September 23rd for K-12 and on September 24th for municipalities.
For many years, Fortinet and LCM have helped the broader public sector, including municipalities, K–12 school boards, hospitals, and children’s aid societies, strengthen their cybersecurity posture using recognized frameworks like NIST and CIS.
With the introduction of Bill 194, these organizations now face new regulatory obligations while continuing to mature their cybersecurity programs.
LCM’s approach integrates Bill 194 compliance, cybersecurity best practices, and enterprise risk management. Our goal is to help organizations build trust, demonstrate accountability, and reduce cyber risk. By aligning with Bill 194 and operationalizing the NIST Cybersecurity Framework, we deliver a structured, repeatable process to identify, protect against, detect, respond to, and recover from threats, ensuring the security of sensitive data.
This integrated strategy supports both evolving compliance requirements and long-term operational resilience. By embedding privacy and security principles across the organization, LCM helps public sector entities meet stakeholder expectations, safeguard public trust, and adapt to a constantly changing threat and regulatory landscape
Agenda
Introduction Challenges of Public Sector Privacy and Security
Understanding of Security Framework
Understanding of Bill 194
Integration of Bill 194 and Security Framework
Building a Budget Plan and Roadmap
Popular Posts
LCM Security’s proprietary FORTIS service helps organizations clearly identify and prioritize their highest cybersecurity risks. Built on industry-recognized frameworks such as NIST CSF and CIS CSC, FORTIS combines these best-practice standards with intelligence gathered by our SOC team to produce targeted risk scores.
For many years, Fortinet and LCM have helped the broader public sector, including municipalities, K–12 school boards, hospitals, and children’s aid societies, strengthen their cybersecurity posture using recognized frameworks like NIST and CIS.
With the introduction of Bill 194, these organizations now face new regulatory obligations while continuing to mature their cybersecurity programs.
There are thousands of cybersecurity vulnerabilities that threaten systems and software, with the potential to cause substantial financial losses for organizations. To protect against these vulnerabilities, organizations need to conduct regular cybersecurity assessments that identify IT security gaps.
On May 18, 2020, the Center for Internet Security (CIS) released Version 8 of its CIS Controls. Formerly the SANS Critical Controls (SANS Top 20) and the CIS Critical Security Controls, the consolidated Controls are now officially called the CIS Controls.
Cybersecurity has become a focal point in the backdrop of COVID-19. Cyberattacks targeting colleges and universities have been on the rise since the pandemic began as institutions migrated to remote learning.
It is commonly quoted that cybersecurity is a business problem, yet you rarely ever hear or see anyone talk about how it’s the business’ problem and what to do about it. In our ever-increasingly connected world, the challenge to truly operationalize good security practices is becoming ever more difficult. COVID-19 in particular …
Life Cycle Management (LCM) Security Inc. provides clients with an all-inclusive solution to cybersecurity built on our Life Cycle approach. This approach has been guiding organizations of all sizes to help define their processes, people, and technology requirements. For almost 20 years , LCM Security Inc. has built our security ..
In 2020, the Maze Ransomware Group have created a ransomware cartel, and other ransomware groups have joined. The mobilization of this cartel presents new cybersecurity challenges for all organizations, but particularly for SMBs. The Maze ransomware group are now infamous …
No doubt there is an enormous amount of information about ransomware being published on a daily and weekly basis for the past several years concerning its effects, the substantial losses and the negative impact for both organizations and the economy as a whole. It seems that very little is …
The first known fatality involving a cyber-attack was recorded in Germany this month. This incident came from a ransomware attack on a hospital that was subsequently unable to provide the life-saving treatment that was previously.Düsseldorf University Hospital’s critical computer systems were taken off-line by …