Technology
Responsibilities of the Information Security Officer-Fa25
This presentation is for those who are new to the ISO (or similar) role or have been the ISO for some time but want to review what is expected and how to be successful.
Securing Office 365 – A Roadmap-Fa25
While Office 365 introduces new and unique threats, new and innovative controls are also a strong benefit of this cloud-based productivity suite.Learn how to implement these controls to best protect your organization.
Today’s Ransomware Threat – Don’t Lose Your Data (And Your Business)-Sp25
Join us to recap the statistics related to ransomware and learn how to prepare for this growing threat.
Two Sides of the Same Coin – How and Why IT Should be Separated from IS-Sp25
In this session, we’ll discuss the differenes between IT and IS and how they can work in harmony.
Using Your BIA and Data Flow Diagrams to Understand Risk-Fa25
This program will look at building a valuable DFD, and you’ll find an answer to the question “where does my data go when it leaves my network, and how is that data being protected?”
Vendor Management 2025 – How to Make Better Vendor Management Decisions-Fa25
This session will help you make better vendor management decisions so you can ensure they’re truly protecting your data.