Presented by the NACo County Tech Xchange and Professional Development Academy

Financial transaction systems are prime targets for cyber threats due to the value and sensitivity of the data. This cyber simulation assesses risks and fortifies safeguards within financial access systems. The simulation involves breaches from unauthorized access to financial systems, often obtained through what seem to be legitimate contacts, but in reality, are not. The simulation seeks to foster a comprehensive understanding of the complexities inherent in securing financial access to systems, enabling the development and testing of proactive strategies to mitigate cyber risks effectively. Insights derived from this simulation will empower institutions to fortify their cybersecurity posture, implement stringent controls, bolster incident response capabilities, and proactively defend against evolving cyber threats targeting financial infrastructure.

Related News

2192555956-
Advocacy

New proposed changes to federal SAM registration may impact county access to federal funding

New proposed changes to federal SAM registration may impact county access to federal funding 

ADA
County News

PDFs are DOA as new web standards approach

Counties with 50,000 residents or more have until April 24 to meet accessibility guidelines for their websites and social media accounts, while smaller counties have another year.

Shannon Smith, director, Public Sector, CAI, speaks Feb. 22 to members of the Mid-Size County Caucus. Photo by Denny Henry
County News

Expert warns Mid-Size County Caucus of rising cybersecurity risks as AI expands

Counties must prepare for increasingly sophisticated cyber threats, particularly if they still rely on aging technology systems, some decades old, which can make them vulnerable to attacks.

Upcoming Events

A worker holds an ipad
Webinar

AI Meets Information Governance in the Public Sector

Wednesday, April 8, 2026 | 1:00 p.m. - 2:00 p.m. ET

Public sector AI adoption is caught in a "regulatory paradox": a strong push for rapid innovation occurring alongside a lack of clear   roadmaps and regulations for information safety. Data privacy regulations remain in full force.

For government information owners, the burden of responsibility for information governance has landed squarely on your shoulders. To innovate and modernize while keeping your information safe, you need a responsible information governance model that ensures only high-quality, compliant data is available for AI tools.

During this session, we’ll explore the four immediate steps you can take to ensure your agency’s AI adoption is secure, compliant, and trustworthy.

  1. Enforcing information minimization

  2. Implementing “need-to-keep” retention policies for AI tools

  3. Demanding privacy-preserving information architectures

  4. The importance of keeping a human in the loop

This webinar is brought to you by NACo EDGE, establishing people, purchasing, and performance cost-saving solutions that can be applied to counties nationwide. EDGE is owned by NACo, advised by county leaders and 100% focused on solutions for U.S. Counties. Learn more about NACo EDGE here.

For more information, visit the event page!