800-348-5194 (Toll Free in WY)

Cybersecurity for DoD Contractors

Mar 06th 1:00 pm - 2:30 pm


Online privacy and security is important for any small business, especially when you’re contracting with the U.S. Department of Defense. This webinar will provide an introduction to securing information in a small business. Topics include:

  • Defining cybersecurity
  • Explaining the importance of securing information through best cybersecurity practices
  • Identifying types of information that should be secured
  • Identifying the types of cyber threats
  • Defining risk management
  • Listing best practices for guarding against cyber threats


This no-cost webinar will also cover National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations.



Jim Drever is a certified Ethical Hacker and a Regional Director for the Wyoming SBDC Network. Jim was born in Laramie, WY and spent several years abroad studying and working in places like Japan, Switzerland, Scotland and Germany. After high school, Jim pursued and earned a degree in Geology, a valuable tool to have hiking and traveling in Wyoming, but Jim found he much preferred the dynamic challenges in the business environment and sought to address those interests in graduate school. In 2003 Jim completed his MBA at the University of Wyoming with the distinction of being the Department of Management and Marketing’s Outstanding Graduate Student.


Jim serves clients in Albany and Carbon Counties with general business topics and clients statewide with issues related to Business Ethics and Cybersecurity. Jim holds a certificate in Teaching Business Ethics from the Anderson School of Management at the University of New Mexico. He also provides assistance with Cybersecurity topics with a background in developing cybersecurity plans, vulnerability assessments and ethical hacking. Jim is a certified Cybersecurity Specialist (CISO) helping clients develop plans, assess their systems/networks, test their own developed applications and services, and help them when their systems have been compromised.


No Cost

register button blue.png


Already Registered? Sign in for more information.


For those that are unable to attend ‘live” at that time, the program will be recorded and registered attendees will receive a link to the recorded session.