Cyber Security for SMB
Small businesses are wide open for hacking. What can small business do to if large companies with dedicated security staff can’t stop...
Use Azure Security Center to prevent, detect, and respond to threats
"Microsoft Azure Security Center helps organizations prevent, detect, and respond to threats by providing increased visibility into the...
Security Standards for Processing Credit Cards
All organizations that process payment cards (Visa, MasterCard, AMEX, etc...) have to comply with the Payment Card Industry Data Security...
Building and Maintaining a Successful RMF Program
TU Building and Maintaining a Successful RMF Program Starting or maintaining an effective and efficient risk management program (RMF)...
Office 365 Cyber Security
Secure Office 365 like a cybersecurity proassessing risk and implementing controls Based on proven experience, our top Office 365...
Introduction to NIST’s Risk Management Framework (RMF)
TU Introduction to NIST’s Risk Management Framework (RMF) StartFragmentThis introductory session will cover the basic steps of the Risk...
Tips for Server Rooms
Server Room Environmental and Physical Security Server Rooms This is a short check list of things to consider when planning your server...
Microsoft Ignite Keynotes
Ignite Keynote Description: “Technology continues to rapidly evolve, offering us new ways of working and powering digital transformation...
Protect and Manage Your Digital Transformation (MS Ignite)
Protect and Manage Your Digital Transformation Brad Anderson VP, Enterprise Mobility Microsoft Session recorded at Microsoft Ignite...
OneNote Does Math
OneNote is one of the tools that I use all the time for all kinds of reasons. It is almost like my right arm; I can’t function without...