Pennsylvania Cybersecurity Resource Center

PA Cybersecurity Resource Center



Providing small- to medium-sized Pennsylvania businesses the awareness, education, and resources needed to achieve and maintain compliance with cybersecurity standards


Concurrent Technologies Corporation (CTC) has partnered with the Commonwealth of Pennsylvania Department of Community and Economic Development to create a resource for PA businesses to improve their cybersecurity. Leveraging CTC’s deep experience securing State and Federal system development, our trusted advisors will update and expand on topics related to protecting your digital assets.

Cybersecurity is a moving target and new threats are announced daily. CTC’s goal for the PA Cybersecurity Resource Center is to provide expert guidance and actionable steps for improving your defenses against attack. Businesses also face a wide array of compliance requirements depending on their marketplace. We will cover the major standards and are happy to take requests via the contact links on this page.


CALL OR EMAIL:


Richard Wolford
Software Engineer,
Cybersecurity Engineering

814-262-6961
pa-cybersecurity@ctc.com

Contact CTC today to help prevent cyber attacks

Cybersecurity Resources
Building a Cyber Program
Building a Cyber Program, integrating cybersecurity
Cybersecurity is not a technical or an IT issue. Technology enables every facet of our business and cyber risks affect the entire enterprise.

Cybersecurity starts at the very top of the organization. Criminals are going to impersonate executives to transfer funds or change direct deposit for payroll.
Cybersecurity Maturity
Model Certification
Cybersecurity Maturity Model Certification, staying informed and preparing as the program evolves
As an independent non-profit organization, we are uniquely qualified to help companies achieve the critical Cybersecurity Maturity Model Certification that will be coming for all contractors within the DoD supply chain.

Cybersecurity starts at the very top of the organization. Criminals are going to impersonate executives to transfer funds or change direct deposit for payroll.
Ransomware
Ransomware, creating an aware workforce for email attacks and a stronger perimeter against hacking
Stolen data and huge payments are in the news far too often. Preventing attackers from getting a foothold in your network is crucial.
Privacy
Privacy, determining what regulations apply and support that is available
All 50 states have enacted some form of privacy legislation and they are all different. Companies that do business or have employees outside of the US may also fall under international rules such as Europe’s GDPR.
Upcoming events


View upcoming event posts on our
LinkedIn Page



Check frequently for future CMMC and System Security Plan workshops and cybersecurity events

CTC does not sell, rent, or share emails provided for updates. By submitting your email address, you agree to updates regarding CTC’s Resource Center information and services. Unsubscribe is available in each email. You can also email pa-cybersecurity@ctc.com and request removal.
Copyright © 2023 Concurrent Technologies Corporation. All rights reserved. Send comments & questions to the Webmaster.

We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability status, protected veteran status, or any other characteristic protected by law.
CTC on Facebook    CTC on LinkedIn    CTC on YouTube