- This event has passed.
ISSA FW August Monthly Chapter Meeting
August 13 @ 6:00 PM - 8:00 PMFree
Small Business Cyber Security Seminar: Cyber Security and Compliance for SMBs
Cyber attacks against small businesses have more than tripled since 2011. But unfortunately, many best practices are geared towards large enterprises or government organizations. Faced with this kind of complexity, small business owners may assume that real cybersecurity is out of their reach, so they give up and just hope for the best.
The good news is that cybersecurity doesn’t have to be complicated or expensive. This seminar will cover specific and practical cybersecurity controls that small business owners can implement, right away, to improve their security and reduce their risk of cybercrime.
60% of small companies that suffer a cyber attack are out of business within six months. Join us to learn specific, mission-critical improvements that you can implement for your small business right away.
1)Advanced Persistent Threat
2)Continuous Adjustment of the Security Baseline
3)Anatomy of a Data Breach
4)Attacking the weakest Link
7)The greatest security risk
8)Many products to choose from
10)Moving to the Cloud
12)Budgeting for risk tolerance
13)Plan of Action and Milestones
14)Data breach – Decide and Define Organization Cybersecurity Culture
15)Cyber Security Insurance – Know your Exposure
ABOUT THE SPEAKERS
Chief Operating Officer
With more than 20 years’ experience in small, medium and large enterprises, Tom Allen has extensive experience growing thriving organizations and delivering products to the global marketplace.
Prior to joining Elemental, Tom served as CIO for Privacy, Inc. Tom’s experience includes serving as Vice President of Engineering and Operations for Vocaldata and Transat Technologies. In these positions, he developed Telco quality products in the Voice Over IP and Wi-Fi Hotspot markets and delivered these products worldwide. He also held several executive positions with Glenayre’s Integrated Network Group including Vice President and General Manager of Open Development Corp., Vice President of Product Management and, Vice President of Product Development. Prior to Glenayre, Tom held executive positions with Interphase Corp. and DSC.
Robert Herron, CISSP, CCSP
Vice President Information Technology
Robert has been working in Information Technology since the late 1980’s. During that time period Robert has worked in almost every function provided by an Information Technology department, from software development to networking infrastructure to cybersecurity. The last 15 years Robert has focused on cybersecurity, disaster recovery, and business continuity, specifically in the highly regulated medical environment. His primary focus has been to ensure not only that the Personally identifiable information (PII) and Protected health information (PHI) is secured but to ensure that should a malicious party gain access or launch a ransomware style attack that the clients would not only be able to recover but would be able to report to all required regulatory agencies that the PII and PHI was not compromised.
President, Process Delivery Systems
Henry Draughon is a former naval aviator and air traffic control officer. He has a Masters Business Administration and Communications. He has an extensive background in IT, project, and process management.
He is currently president and owner of Process Delivery Systems, a business process optimization consulting firm. Process Delivery Systems, (PDS) helps clients identify their critical decisions and align policies, processes, personnel and resources for fast and effective execution. One of the company’s main goals is to eliminate confusion from complexity.
Henry has extensive strategic level cyber security experience with large and small companies. To ignore or take cyber security lightly is absolutely the worst thing any small company can do. The bad guys are smart and know that’s what many small companies are doing making them low-hanging fruit for covert cyber-attacks.
The requirements of protecting sensitive data are only going to increase with IoT and the coming data protection and privacy of individual’s laws. Best recommendation is to team up with a consultant that will help construct a long-term, living plan and team based on proven and documented best practices. Your company’s cyber security network should include an established internal team and external associates that would include cyber insurance, legal, and law enforcement.
Owner – Community Insurance Advisors
John Allen is owner of Community Insurance Advisors, an independent property and casualty agency. John believes a significant percentage of the conversations people have about insurance coverage are incomplete and/or incorrect, and has therefore made the mission of his agency to raise the bar by delivering quality programs with honesty and integrity. John earned his BA from Illinois, and his MBA from Loyola Marymount. His work experience includes national account sales and product management in the transportation industry, and outsourced contact center management.