Skip to main content

Data Security: Practical Steps To Minimize Risk

Loading video

This video is currently being processed. It will be ready for viewing shortly.

A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.
A small thumbnail of this item.

Thank you

This live web event has ended. Thank you for attending.

Description


One of the busiest times for hackers is during the peak season. Does your management team know the risks?

Data is one of your most crucial business assets; protecting it should be a top priority. However, knowing the risks may be much easier to protect your company from hackers, viruses, and malware.

In this session, you will learn about different cyber security attacks and how to protect your business from them. In addition, attendees will gain insights into the latest cybersecurity tips. Finally, the panelists will discuss how to protect your company during peak season, avoiding phishing scams, examples of attacks that could have been averted, and setting up security policies for when an employee leaves the company!

Register on Zoom
Zoom

Contributors

  • Hugh St. Martin

    Director, IT Services & Security
    Aires

    Hugh joined Aires in 2020 with 24 years of experience in cyber operations with the Department of Defense. Hugh designs and implements Aires’ IT infrastructure strategy. He leads the day-to-day operations of IT infrastructure and security activities ensuring high availability and a secure environment for client and partner services.

    Prior to joining Aires, Hugh served as an officer in the U.S. Air Force holding positions as Commander, 2nd Communications Squadron, Chief of Network Operations, Joint Chiefs of Staff, Commander, Commander, 1 Air & Space Communications Operations Squadron, Commander, 3rd Presidential Communications Command, White House Comm Agency, and Chief, Network Operations & Security Center, Air Combat Command. His credentials include the Certified Information Security Manager (CISM) and Information Technology Infrastructure Library (ITIL)designations, a bachelor’s degree, and master’s degree.

  • Jelle Wieringa

    Security Advocate
    KnowBe4


    Jelle works for KnowBe4 as a Security Advocate. KnowBe4 is the provider of the world's most popular security awareness and simulated phishing platform. In this role, I travel the globe to give talks to promote the role of humans in security.

    The human factor is often one of the most forgotten subjects in Information Security. Even though it is easier to trick people than to break through security technology. Therefore, social engineering is often used as a favorite way to gain access to sensitive information. And is one of the key attack vectors through which organizations get into real trouble. Yet, most fail to pay enough attention to manage this ongoing problem. It is because of this I work to promote the human factor in cybersecurity and advocate how we can strengthen it.

  • Zach Rattner

    Co-Founder and CTO
    Yembo

May 11, 2022
Wed 11:00 AM EDT

Duration 1H 0M

This live web event has ended.

Support Contact