County Innovation Network (COIN)

Topic Spotlight: Cybersecurity

Identifying and Reporting Common Scams

It may seem like a day doesn't go by without scammers contacting you online or by phone seeking money and/or personal information.

Read full article

Feature Article: Connected Home Devices: The Internet of Things

By: MS-ISAC

Basically, if it is not a computer, smartphone or tablet, and it connects to the Internet, it can be called an IoT device.

Read full article

Members of the COIN are sharing information resources, starting conversations and volunteering to answer your questions on Cybersecurity. Click on the links below to: find and share, start and join conversations, and ask the experts.

Information Exchange

View more files
profile picture
Coin Admin
Community Manager

Solutionize Inc
Bergen County, NJ

MS-ISAC CYBERSECURITY ADVISORY: Multiple Vulnerabilities in Mozilla Thunderbird Could Allow for Arbitrary Code Execution

Document type: Advisory
Author: MS-ISAC
File size: 0.24 MB
Uploaded on 8/21/2017 2:52 pm
Downloaded 0 times

Categories:
Cybersecurity
Technology and Innovation

Tags:
arbitrary code execution
email client
Mozilla Thunderbird
Downoad file
profile picture
Coin Admin
Community Manager

Solutionize Inc
Bergen County, NJ

MS-ISAC CYBERSECURITY ADVISORY: Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution

Document type: Advisory
Author: MS-ISAC
File size: 0.32 MB
Uploaded on 8/21/2017 9:29 am
Downloaded 0 times

Categories:
General
Cybersecurity

Tags:
arbitrary code execution
Google Chrome
web browser
Downoad file
profile picture
Coin Admin
Community Manager

Solutionize Inc
Bergen County, NJ

Connected Home Devices: The Internet of Things

Document type: Best Practices
Author: MS-ISAC
File size: 0.35 MB
Uploaded on 8/14/2017 12:35 pm
Downloaded 2 times

Categories:
General
Cybersecurity

Tags:
devices
Internet of Things (IoT)
passwords
personal information
security threat
Downoad file

Community Hot Topics:Cyber for Counties

Start / Join a conversation
 

Community Helping Hands

profile picture
Phil Bertolini
Deputy County Executive/CIO

Oakland County
Oakland County, MI

Area of expertise:
Cyber Security
profile picture
Mary ann Borgeson
Commissioner

Douglas County
Douglas County, NE

Area of expertise:
Chair- NACO Cyber Security Task Force
profile picture
Danielle Cox
Information Security Officer

State of West Virginia
Kanawha County, WV

Area of expertise:
Training and End-User Education; Policy
profile picture
David Freeman
IT Director

Limestone County
Limestone County, AL

Area of expertise:
Business Continuity, Disaster Recovery, Network Security
profile picture
Jerryl Guy
Information Technology Manager

National Association of Counties
District Of Columbia, DC

Area of expertise:
Security Policy, Information Sharing
profile picture
Ralph Johnson
Chief Information Security and Privacy Officer

King County
King County, WA

Area of expertise:
Information security policy and program development. Information security controls, Compliance
profile picture
Anthony Kava
IT Supervisor / Information Security Officer, Special Deputy Sheriff

Pottawattamie County
Pottawattamie County, IA

Area of expertise:
InfoSec Operations and Policy, Digital Forensics, Cyber Crime #Iowa
profile picture
Brian Kelley
CIO

Portage County
Portage County, OH

Area of expertise:
Security
profile picture
Catherine Maras
Chief Information Officer

Bexar County
Bexar County, TX

Area of expertise:
PCI Compliance, strategic planning, holistic approach
profile picture
Rita Reynolds
CIO

County Commissioners Association of PA
Dauphin County, PA

profile picture
Joel Rohne
IT/GIS Director

Worth County
Worth County, IA

Area of expertise:
#iowa
profile picture
David Whicker
CIO

Rockingham County
Rockingham County, NC

Area of expertise:
Information Technology Governance, IT Security; Penetration Testing; Auditing
profile picture
Scott Williams
IT Director

Marshall County
Marshall County, IA

Area of expertise:
Information Security, Awareness