Webinar: Building A Framework-Based Managed Security Program in Your Business

Cybersecurity has become an even hotter topic over the last 12 months as businesses have accelerated their plans to operate in virtual and remote environments. Despite the growth of sophisticated techniques used by cyber criminals, we know that 98% of data breaches can be prevented by implementing the Center for Internet Security’s Top 20 Critical Security Controls correctly.

Surprisingly, most businesses have not implemented these Top 20 Controls. In this webinar, we discussed the different types of CIS security controls and explored a globally-recognized framework for assessing your business’ existing cybersecurity defenses. The webinar included two guest cybersecurity experts, Kevin Holmes and Eric Rockwell from MAP CyberSecure.

  • Kevin Holmes is the Audit and Assurance Practice Leader at Martini Akpovi Partners and has extensive experience in internal controls consulting. He holds the AICPA Internal Control Certification in the COSO Internal Control Integrated Framework. Kevin also holds an AICPA Certification in Cybersecurity Advisory Services.
  • Eric Rockwell has more than 17 years of leadership experience helping clients optimize their IT environment while aligning with business goals. A member of the Center for Internet Security, Eric is an expert in risk management, incident response, infrastructure protection, business continuity and disaster recovery.

Special thanks to our partner:

 

Share:

Subscribe to TechMD Insights






More Posts

Russian Invasion Requires Increased Cybersecurity Alertness 

You have probably heard the news by now that Russia has invaded Ukraine, and this will likely have a major impact on the cybersecurity world moving forward. The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is recommending that all American organizations be on high alert, especially small and mid-sized businesses as they are seen as softer targets for cybercriminals.

Top 3 Takeaways from the 2021 Verizon Data Breach Investigations Report 

Every year, Verizon releases their Data Breach Investigations Report (DBIR) and it usually contains some useful takeaways about how SMBs can protect themselves from cybercriminals. In case you haven’t read this 119-page report, here’s TechMD’s breakdown of the Top 3 most relevant takeaways for your business. 

Top 3 IT Priorities for 2022

2021 has been another year of “unprecedented times” as the COVID-19 pandemic has continued long past what many expected. With this continued level of uncertainty, it’s more important than ever that organizations have their IT in order and prioritized. Our team here at TechMD have put together three top IT priorities for 2022 to help you be prepared for the ever-changing IT landscape.