Archive for 'Workshops' Category
Dan has whittled all the noise to five resources a Small Business Owner should investigate (and utilize).
Not having strong policies surrounding shared passwords could make your data a hostage An article review. Do you know who is in control of the various account credentials used by your organization’s employees? One Indianapolis company is, but only after a fired employee held a vital password hostage for $200,000 according to an article in […]
Webinars, Workshops, and Conferences in 2017! Note: all dates are tentative and are in Eastern time zone (EDT/EST)! Wanna know where infotex is going to be teaching this year? Let us know which topics you would like to see! Last Topic: Vigilize This! – Cybersanity and the Incident Response Program! Watch Recorded Webinar! Current Topic: Top Seven Risks […]
How to Review a SOC One or Two! Webinar This is the seventh stop on our 2016 IT Governance Tour.
FREE infotex Webinar – Training Your Incident Response Team – The CAT MAIT Almanac November 16th 2016 at 9AM EDT Start planning for easy ways to Train Your Incident Response Team in 2017. Dan will run through an almanac of CAT statements and suggest how existing guidance can be leveraged. Register Now!
FREE infotex Webinar – Technology Planning for Small Institutions October 26th 2016 at 9AM EDT If you’ve found time to read the December 2015 update to the FFIEC’s Management Booklet, you might already have a new “to-do” for the fourth quarter of 2016: creating and documenting a Technology Plan. Our annual webinar on the subject […]
There is no excerpt because this is a protected post.
Theme: Awareness In All Directions! 1:00 Welcome, Dan and Stacey Hadaway 1:05 Teaching Out Of Wallet Questions, Dan Hadaway, – 20 minutes or so 1:25 Ambient Music Performance 1:30 The infotex Managed Security Services Development Roadmap, Michael Hartke – 20 minutes or so 1:50 The infotex CAT […]
FREE Infotex Webinar – Data Flow Diagramming March 17th, 2016 1pm – 2pm EST FREE Infotex Webinar: Data Flow Diagramming If you’ve performed your Cybersecurity Assessment you’re probably wondering, “what is this data flow diagramming thing, why have my auditors never asked me for it, and how do I do one for my bank?” Join […]