Browse through active projects and recent relocations to see what’s happening in the county, or search available sites and find your business’ perfect location.
CAEDC offers a selection of financing programs and incentives for all types of businesses. View different financing scenarios and all your options here.
Cumberland Valley is the perfect place to live, work and play. Our high quality of life includes quaint towns, housing options, recreational opportunities, educational institutions and more.
Cumberland Valley has a diverse set of key industries due to our strategic location, skilled workforce, great highway systems and high quality of life. The county is also the fastest growing county in the state, allowing for more growth opportunities and a robust economy.
Find useful data regarding our population and demographics, industry mix, workforce profile and more. Browse our Interactive Data Map for more facts and info about the County.
« All Events
“Practical Cyber Security for You and Your Business”
Presented by:
Dawn Sizer, CEO at 3rd Element Consulting
Have you shopped at Macy’s, Best Buy, or GameStop? Eaten at Panera, Chipotle, Sonic, or Arby’s. Maybe you use LinkedIn, Facebook, or My Fitness Pal? Have you flown on Delta or British Airways? Stayed at Holiday Inn, Hyatt, or a Kimpton Hotel? Do you have a DUNs number or you or your child submitted a FAFSA? If you said yes to any of those questions you have had your data stolen in some form in the last year. 3rd Element will walk through the anatomy of different types of breaches like these and more. Show you how they happen, using real world examples. We will explain what can happen with the data, and how it can be used. We will show you how to find the weak links in your digital security. Finally, we give you some strategies to prepare for when a breach happens, because it will, or already has. You just don’t know about it, yet.
The presentation will cover:
* Current threats with real case studies
* The Dark Web and its impact on you
* How to ID the weakest link(s) in your security landscape
* Strategies to prepare for, mitigate, and remediate a breach.