…Cowper Operations Manager Lucas King Marketing & Communications Specialist Barry Eitel Editorial Director Alexandria Coutu Event Manager Jamileth Williams HBCU Program Manager Levi Smith Marketing and Events Co-op Arturo Morales…
…a computer or three. But because my name starts with a ‘Z’ and is at the end of the alphabet, I always got stuck sharing the computer with four people….
…when it comes to securing your cloud, including: Identity & permissions, data security, platforms security, and compliance. Learn more at Sonrai Security: https://sonraisecurity.com/ Guest Contributor: Eric Kedrosky, CISO, Sonrai Security…
…government, industry, nonprofits and academia come together to discuss the current state of cybersecurity and the future of the industry. Turning Awareness into Action Fireside Chat: Government and Industry Collaboration…
…common in the work environment over recent years. Once considered a no-no in the workplace, mobile devices are now extremely common. In fact, 87% of companies say that they expect…
…recommend working closely with a dedicated insurance professional who specializes in cybersecurity, because the topic is undeniably complex. Misconception 7: Cybersecurity Compliance Equals Cybersecurity Protection Don’t fall for the myth…
…easy as if it were a password. Come see how. Come learn how to better defend your MFA and what MFA is strong and resilient 9:50 AM: After the Breach:…
…as they demonstrate competence in safe and secure online behavior. Keep a clean machine Cybersecurity starts with protecting all household computers with a security suite, meaning antivirus, antispyware, and firewall…
…data. Privacy laws are shifting globally in a big way, and this evolution is keeping privacy professionals on their toes. With the increased complexity of compliance with global privacy requirements,…