A Day in the Life… Cybersecurity Edition

Image of Cyber Engineer

Beyond the Hollywood Hacker A hooded figure sits at a small desk in complete darkness with just the light of the computer screen dimly illuminating the outline of their face as they furiously pound away at their keyboard. Suddenly they stop typing and in an ominous voice exclaim “I’m in!” For most people when they…

Read More

Identifying and Reporting Cybersecurity Incidents

Image of Cybersecurity Investigators Guide

Discover how to best identify and report cybersecurity incidents! Knowing what to look for when evaluating a potential cybersecurity incident and being prepared to handle a cybersecurity incident is extremely important in today’s world, when a majority of incidents go unreported.

Read More

5 Steps to Protect PII

Image of 5 Steps to Protect PII Presentation Title Page

A Practical Guide For Protecting Our Most Important Information It seems that week after week there is a new story in the news about yet another company suffering a data breach. It has become so commonplace now that only the truly large breaches make the headlines. But despite truly staggering numbers of data breaches, many…

Read More