Please join Brad Maryman and Dr. Joseph Greenfield of Maryman & Associates on July 27th for the next Technology & Security Management HappyHour! Description: Very little is certain in today’s world, but everyone agrees that data breaches … [Read more...] about Technology & Security Management HappyHour: Breach Case Study – Preparing for the Inevitable with Brad Maryman and Joe Greenfield
Attorneys
Community Engagement Working Group
The objective of the Community Engagement Working Group is to provide tools and education to CyberGuardians - individuals and families - so they can more effectively secure and keep private their sensitive information. Working group members come from … [Read more...] about Community Engagement Working Group
Security & Privacy Leadership Team
Discussion Topic: The intersection of information security management and cyber-law. SecureTheVillage hosts a monthly meeting of senior cybersecurity and privacy professionals for camaraderie and purpose. CyberLeaders Attorneys in security … [Read more...] about Security & Privacy Leadership Team
How to Protect Your Company Without Breaking the Bank
Based on Ben Franklin's principle that "an ounce of prevention is worth a pound of cure," Stan shows how an organization can lower its total cost of security by emphasizing sound management and proactive leadership. The cost of securityThe twelve … [Read more...] about How to Protect Your Company Without Breaking the Bank
Responding to Ransomware, A Business View
Responding to Ransomware, A Business View, provides a business perspective on how a company should be prepared to respond in the event of ransomware. Too often, ransomware discussions are acutely focused on the cybersecurity element or IT … [Read more...] about Responding to Ransomware, A Business View
Covered 6
The Covered 6 Cyber Security Technician program is the Department of Labor National Program Standard in cybersecurity training. Our Cyber Impact Teams help organization secure their infrastructure and recover from ransomware attacks and … [Read more...] about Covered 6
Mr. Lee McWhorter
Lee McWhorter, CTO at Covered 6, has been involved in IT since its early days and has over 30 years of experience. He is a highly sought after professional who first learned about identifying weaknesses in computer networks, systems, and software … [Read more...] about Mr. Lee McWhorter
Mr. Stuart Gross
PROFESSIONAL Information Technology Executive and Consultant for Public and Private Equity owned Healthcare, Financial Services, and other industry companies. Stuart takes business challenges and applies technology solutions that achieve dramatic, … [Read more...] about Mr. Stuart Gross
The Heart of Cybersecurity – Keeping Your Organization Safe From CyberCrime with Kim Pease, CISSP
How do you keep your organization secure? Perhaps more important than firewalls and multi-factor authentication is leadership. Good leaders … . that intricate weaving together of the head and the heart … towards the higher purpose of securing an … [Read more...] about The Heart of Cybersecurity – Keeping Your Organization Safe From CyberCrime with Kim Pease, CISSP
The Cyberspace Solarium Commission (CSC)
Introduction The Cyberspace Solarium Commission (CSC) was established in the John S. McCain National Defense Authorization Act for Fiscal Year 2019 to "develop a consensus on a strategic approach to defending the United States in cyberspace against … [Read more...] about The Cyberspace Solarium Commission (CSC)