

Radical New Approaches to Security Analytics
This video is a recording of a keynote talk by Martin Fink the Executive Vice President, Chief Technology Officer, Hewlett-Packard...


Maze Live 2016 Cyber-security for Local Governments
I spoke at a recent day long conference and here is the recording of that session. Session description: Is your organization doing enough...


Starting a Cyber Security Career
People often ask, “What do I need to do to get into cyber security?” The requests are continuing to come in now that Obama says the...


People & Cyber Security
Cyber attacks are on the rise, affecting companies, government agencies and millions of people. Headlines are filled with stories about...


TU RMF Roles and Responsibilities (Part 1)
TU RMF Roles and Responsibilities (Part 1) People are a critical factor in any cyber security imitative. In this session we will cover...


Cyber Security for SMB
Small businesses are wide open for hacking. What can small business do to if large companies with dedicated security staff can’t stop...


Use Azure Security Center to prevent, detect, and respond to threats
"Microsoft Azure Security Center helps organizations prevent, detect, and respond to threats by providing increased visibility into the...


Security Standards for Processing Credit Cards
All organizations that process payment cards (Visa, MasterCard, AMEX, etc...) have to comply with the Payment Card Industry Data Security...


Building and Maintaining a Successful RMF Program
TU Building and Maintaining a Successful RMF Program Starting or maintaining an effective and efficient risk management program (RMF)...


Office 365 Cyber Security
Secure Office 365 like a cybersecurity proassessing risk and implementing controls Based on proven experience, our top Office 365...