Skip to main content

Data Security: Practical Steps To Minimize Risk

Loading video

This video is currently being processed. It will be ready for viewing shortly.

A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.

Thank you

This live web event has ended. Thank you for attending.

Contributors

  • Hugh St. Martin

    Director, IT Services & Security
    Aires

    Hugh joined Aires in 2020 with 24 years of experience in cyber operations with the Department of Defense. Hugh designs and implements Aires’ IT infrastructure strategy. He leads the day-to-day operations of IT infrastructure and security activities ensuring high availability and a secure environment for client and partner services.

    Prior to joining Aires, Hugh served as an officer in the U.S. Air Force holding positions as Commander, 2nd Communications Squadron, Chief of Network Operations, Joint Chiefs of Staff, Commander, Commander, 1 Air & Space Communications Operations Squadron, Commander, 3rd Presidential Communications Command, White House Comm Agency, and Chief, Network Operations & Security Center, Air Combat Command. His credentials include the Certified Information Security Manager (CISM) and Information Technology Infrastructure Library (ITIL)designations, a bachelor’s degree, and master’s degree.

  • Jelle Wieringa

    Security Advocate
    KnowBe4


    Jelle works for KnowBe4 as a Security Advocate. KnowBe4 is the provider of the world's most popular security awareness and simulated phishing platform. In this role, I travel the globe to give talks to promote the role of humans in security.

    The human factor is often one of the most forgotten subjects in Information Security. Even though it is easier to trick people than to break through security technology. Therefore, social engineering is often used as a favorite way to gain access to sensitive information. And is one of the key attack vectors through which organizations get into real trouble. Yet, most fail to pay enough attention to manage this ongoing problem. It is because of this I work to promote the human factor in cybersecurity and advocate how we can strengthen it.

  • Zach Rattner

    Co-Founder and CTO
    Yembo

May 11, 2022
Wed 11:00 AM EDT

Duration 1H 0M

This live web event has ended.

Support Contact