WHO SHOULD ATTEND:
CEOs, CFOs, Presidents, Business Owners and other C-level decision makers
Tuesday, May 14th 2019 from 12:00-12:30pm CT
When it comes to cybersecurity, there is no one-size-fits-all approach. Every company will face their own unique security challenges that will require implementing customized solutions to ensure the physical and digital security of their business.
However, there are a few guidelines every company should incorporate to mitigate risk and vulnerabilities – and our experts will be on hand to provide the foundation for a better and more secure cybersecurity strategy.
Please join us for a complimentary webinar as the experts at RGCybersecurity highlight the key ways for businesses of all sizes to develop and improve their overall risk management. The team, led by RGCybersecurity Vice President of Cybersecurity Jon Murphy and Associate Director Jason Robbins, will highlight the implementation of the following eight risk-mitigation strategies:
- Proper Audit/Assessment Procedures
- Organizational Policies
- Awareness Programs
- Personnel Training
- Scanning & Patching
- Multi-factor Authorization for Remote Connections
- Business Continuity/Disaster Recovery Exercises
- Backups & Testing
Whether you have a vetted risk management strategy or have no idea where to start, this presentation is a must-attend for business owners that are serious about protecting their organization and clients.
About the Presenters:
Jon Murphy has 25+ years of success as a Business Technology Leader and IT Risk Management Consultant. He has created and led Technology Risk Management programs for federal and state governmental entities, eCommerce organizations, and legal/finance/real estate and many other verticals.
Jason Robbins has a deep understanding and extensive history of developing and implementing risk mitigation and cybersecurity strategies in both the private and public sector. Jason has worked within the military, government and commercial businesses with both IT and OT networks to perform a wide array of services from incident response, computer forensics, penetration testing, vulnerability management and strategic vision.
Have questions or comments? Email email@example.com
Complete the form below to register.