Security Standards for Processing Credit Cards
All organizations that process payment cards (Visa, MasterCard, AMEX, etc...) have to comply with the Payment Card Industry Data Security...
Building and Maintaining a Successful RMF Program
TU Building and Maintaining a Successful RMF Program Starting or maintaining an effective and efficient risk management program (RMF)...
Office 365 Cyber Security
Secure Office 365 like a cybersecurity proassessing risk and implementing controls Based on proven experience, our top Office 365...
Introduction to NIST’s Risk Management Framework (RMF)
TU Introduction to NIST’s Risk Management Framework (RMF) StartFragmentThis introductory session will cover the basic steps of the Risk...
Tips for Server Rooms
Server Room Environmental and Physical Security Server Rooms This is a short check list of things to consider when planning your server...
Microsoft Ignite Keynotes
Ignite Keynote Description: “Technology continues to rapidly evolve, offering us new ways of working and powering digital transformation...
Protect and Manage Your Digital Transformation (MS Ignite)
Protect and Manage Your Digital Transformation Brad Anderson VP, Enterprise Mobility Microsoft Session recorded at Microsoft Ignite...
OneNote Does Math
OneNote is one of the tools that I use all the time for all kinds of reasons. It is almost like my right arm; I can’t function without...