Subscribe to our blog

Articles published weekly by IT security and compliance professionals with decades of experience

  

Subscribe to our blog

Articles published weekly by IT security and compliance professionals with decades of experience

  

Subscribe to our blog

Articles published weekly by IT security and compliance professionals with decades of experience

Resources

Presentations

2018 Webinar Series Presentations

Business Resilience Webinar Presentation
 
The Next Step in Business Continuity - Business Resilience

June 2018 GDPR Webinar

GDPR - Know Your Responsibilities 

New call-to-action

Changes to the NIST Cybersecurity Framework

New call-to-action

Changes to the Top 20 Critical Security Controls

New Call-to-action

Security vs. Compliance

New Call-to-action

Role of Digital Forensics in Cybersecurity

Incident Response Program Presentation

Incident Response Program

2017 Webinar Series Presentations

New Call-to-action

PCI Requirements for January 2018 - Are You Ready?

New Call-to-action

GDPR Overview

New Call-to-action

WannaCry Ransomware

New Call-to-action

10 Tips to Becoming More Secure

New Call-to-action

Grizzly Steppe Hacking

New Call-to-action

Know Thy Vendor

New Call-to-action

Recent New York Cyber Laws

2016 Webinar Series Presentations

New Call-to-action

Building a Culture of Security

New Call-to-action

Demystifying SOC Reports and the Five Trust Service Principles

New Call-to-action

The Importance of IT Policies and Procedures

New Call-to-action

Ransomware Explained

Top 5 Tips to Mitigate Your Risk

Top 5 Tips to Mitigate Your Risk

New Call-to-action

Think You're Immune From Being Hacked?

New Call-to-action

IT Governance, Risk, and Compliance

New Call-to-action

Healthcare IT Security Challenges

New Call-to-action

Developing an Incident Response Program

New Call-to-action

PCI DSS 3.2 Changes

CIS Critical Security Controls Presentation

CIS Critical Security Controls

Vulnerability Scanning and Penetration Testing Presentation

Vulnerability Scanning and Penetration Testing

New Call-to-action

Social Engineering

2015 Webinar Series Presentations

FFIEC IT Audit Management Booklet Update

FFIEC IT Audit Management Booklet Update

Vendor Management Presentation Download

Vendor Management

New Call-to-action

Data Breach, Privacy Security, and Risk Assessment

Incident Response Presentation

Incident Response Program

SSAE16 Changes Presentation

SSAE16 Changes

NIST Cybersecurity Presentation

Intro to NIST Cybersecurity Framework