[cz_image css_position=”relative;display: table;margin:0 auto” id=”cz_79921″ image=”17220″ css_width=”75%” sk_css=”padding-top:10px;padding-bottom:10px;”][/cz_image]
[cz_gap height=”90px” height_tablet=”10px” height_mobile=”10px”][cz_title title_pos=”cz_title_pos_center” id=”cz_45636″]

Learn about Cybersecurity and the steps you can take to Protect your Business


[/cz_title][cz_gap height=”65px” height_tablet=”10px” height_mobile=”10px”]

[cz_gap height=”110px” height_tablet=”100px” id=”cz_37266″][cz_title shape=”icon” shape_icon=”fas fa-lock” id=”cz_62690″ sk_shape=”color:rgba(186,2,48,0.19);”]

Les Olson IT

Security Summit Details

[/cz_title][cz_gap height=”70px” height_tablet=”20px” height_mobile=”20px” id=”cz_62699″]

[cz_gap height=”41px”][cz_title id=”cz_66932″]

This year, Cybersecurity Awareness Month’s main focal areas revolve around four key fundamental cybersecurity best practices:

[/cz_title][cz_gap height=”41px”]

[cz_gap id=”cz_28959″][cz_stylish_list id=”cz_81369″ items=”%5B%7B%22title%22%3A%22Recognizing%20and%20reporting%20phishing%22%2C%22subtitle%22%3A%22Phishing%20is%20still%20one%20of%20the%20primary%20threat%20actions%20used%20by%20cybercriminals%20today.%22%2C%22icon_type%22%3A%22icon%22%2C%22icon%22%3A%22fa%20czico-071-interface-1%22%2C%22icon_color%22%3A%22%23ba0230%22%7D%2C%7B%22title%22%3A%22Understanding%20the%20benefits%20of%20using%20a%20password%20manager%22%2C%22subtitle%22%3A%22and%20dispelling%20existing%20myths%20around%20password%20manager%20security%20and%20ease%20of%20use.%22%2C%22icon_type%22%3A%22icon%22%2C%22icon%22%3A%22fa%20czico-071-interface-1%22%2C%22icon_color%22%3A%22%23ba0230%22%7D%5D” sk_lists=”font-size:24px;color:#ba0230;font-weight:600;font-style:italic;” sk_subtitle=”font-size:18px;color:#333333;font-weight:300;font-style:normal;” sk_overall=”padding-bottom:20px;margin-bottom:20px;”]
[cz_image image=”17252″ id=”cz_38103″ sk_css=”margin-bottom:-20px;”][/cz_image]
[cz_gap id=”cz_28959″][cz_stylish_list id=”cz_15658″ items=”%5B%7B%22title%22%3A%22Enabling%20multi-factor%20authentication%22%2C%22subtitle%22%3A%22on%20personal%20devices%20and%20business%20networks.%22%2C%22icon_type%22%3A%22icon%22%2C%22icon%22%3A%22fa%20czico-071-interface-1%22%2C%22icon_color%22%3A%22%23ba0230%22%7D%2C%7B%22title%22%3A%22Installing%20updates%20on%20a%20regular%20basis%22%2C%22subtitle%22%3A%22and%20turning%20on%20automated%20updates%22%2C%22icon_type%22%3A%22icon%22%2C%22icon%22%3A%22fa%20czico-071-interface-1%22%2C%22icon_color%22%3A%22%23ba0230%22%7D%5D” sk_lists=”font-size:24px;color:#ba0230;font-weight:600;font-style:italic;” sk_subtitle=”font-size:18px;color:#333333;font-weight:300;font-style:normal;”]
[cz_gap height=”100px”]
[cz_gap height=”110px” height_tablet=”100px” id=”cz_37266″][cz_title shape=”icon” shape_icon=”fas fa-lock” id=”cz_27926″ sk_shape=”color:rgba(186,2,48,0.19);” cz_title=””]

Les Olson IT

Security Summit Keynote Speaker Videos

[/cz_title][cz_gap height=”70px” height_tablet=”20px” height_mobile=”20px” id=”cz_62699″]

[cz_image image=”17282″ id=”cz_41837″ sk_css=”position:relative;display: table;margin:0 auto;”][/cz_image]
[cz_gap height=”44px” id=”cz_12878″][cz_content_box type=”1″ id=”cz_94500″ sk_overall=”background-color:rgba(255,255,255,0.9);padding-left:120px;margin-left:-100px;border-style:solid;border-width:1px;border-color:#f4f4f4;border-radius:20px;” sk_overall_tablet=”padding-left:30px;margin-left:0px;”][cz_title bline=”cz_line_after_title” id=”cz_25287″ sk_lines=”background-color:#ba0230;height:2px;top:-10px;” sk_overall=”margin-bottom:14px;”]

Charles Kikumoto

[/cz_title]

Executive Risk Practice Leader at Moreton & Company

[/cz_content_box][cz_free_position_element hide_on_tablet=”true” hide_on_mobile=”true” css_top=”43.18139792899408%” css_left=”-20%” id=”cz_82151″]
[/cz_free_position_element][cz_title id=”cz_36824″ sk_overall=”padding-right:30px;”]Speaker Bio: Charles has 20+ years of industry experience.  Prior to joining Moreton & Company, Charles was responsible for brokering significant executive liability insurance premiums with AON Financial Services Group in Denver, Colorado.  Charles has been a trusted advisor to national and international accounts ranging from large private companies to Fortune 500 entities.  Charles also provides strategic risk advisory services to the Board of Directors for non-profit and for-profit entities.  [/cz_title]
[cz_gap height=”100px”]
[cz_gap height=”100px”]
[cz_gap height=”100px”]
[cz_gap id=”cz_59822″][cz_content_box type=”1″ id=”cz_57156″ class=”z9″ sk_overall=”background-color:rgba(255,255,255,0.9);padding-right:120px;margin-right:-100px;border-style:solid;border-width:1px;border-color:#f4f4f4;border-radius:20px;” sk_overall_tablet=”padding-right:30px;margin-right:0px;”][cz_title bline=”cz_line_after_title” id=”cz_78684″ sk_lines=”background-color:#ba0230;height:2px;top:-10px;” sk_overall=”margin-bottom:14px;”]

Natalie Suarez

[/cz_title]

Principal Solution Advisor at ConnectWise

[/cz_content_box][cz_free_position_element hide_on_tablet=”true” hide_on_mobile=”true” css_top=”44.008190883190885%” css_left=”107.83333333333334%” id=”cz_73688″]
[/cz_free_position_element][cz_title id=”cz_70378″ sk_overall=”padding-left:30px;”]Speaker Bio: Natalie has over 20 years of Software and Systems Engineering experience. She focuses on bridging the gap between client requirements and successful client deployments, acting as a liaison between client-facing and technical teams. Natalie brings experience in leading enterprise Information Technology projects from the private and public sectors, include Fortune 100 companies, Sharing Communities (ISACs & ISAOs), Department of Defense (DoD), and government agencies[/cz_title]
[cz_gap height=”1px” id=”cz_63589″ height_tablet=”50px”][cz_image image=”17263″ id=”cz_85293″ sk_css=”margin:0 auto;” sk_css_tablet=”margin-bottom:30px;”][/cz_image]
[cz_gap height=”100px”]
[cz_gap height=”100px”]
[cz_gap height=”100px”]
[cz_image image=”17261″ id=”cz_88572″ sk_css=”position:relative;display: table;margin:0 auto;”][/cz_image]
[cz_gap height=”44px” id=”cz_12878″][cz_content_box type=”1″ id=”cz_94500″ sk_overall=”background-color:rgba(255,255,255,0.9);padding-left:120px;margin-left:-100px;border-style:solid;border-width:1px;border-color:#f4f4f4;border-radius:20px;” sk_overall_tablet=”padding-left:30px;margin-left:0px;”][cz_title bline=”cz_line_after_title” id=”cz_109566″ sk_lines=”background-color:#ba0230;height:2px;top:-10px;” sk_overall=”margin-bottom:14px;”]

Garrett Gross

[/cz_title]

Sr Director, Technical sales at Huntress

[/cz_content_box][cz_free_position_element hide_on_tablet=”true” hide_on_mobile=”true” css_top=”43.18139792899408%” css_left=”-20%” id=”cz_82151″]
[/cz_free_position_element][cz_title id=”cz_93430″ sk_overall=”padding-right:20px;padding-left:20px;”]Speaker Bio: Garrett Gross has over 20 years of experience in information security. His shared passion for technology, problem solving, and people has led Garrett to some incredible opportunities in the past but currently is the driving force behind his efforts as Sr Director, technical sales, at Huntress. In this role, Garrett is focused on driving revenue growth by building a global network of technical experts to support the sales enablement processes and effectively communicate the value of Huntress’s service offering.

 

Prior to that, Garrett has held a variety of technical responsibilities, including technical support, systems administration, network engineering, penetration testing, tools development, and building/leading security operations teams.

 

Garrett also serves as advisor to several security firms, contributes regularly to podcasts/webinars, competes in CTFs, and looks for ways to mentor those starting out in the security industry.[/cz_title]

[cz_gap height=”100px”]
[cz_gap height=”100px”]
[cz_gap height=”100px”]
[cz_gap id=”cz_59822″][cz_content_box type=”1″ id=”cz_57156″ class=”z9″ sk_overall=”background-color:rgba(255,255,255,0.9);padding-right:120px;margin-right:-100px;border-style:solid;border-width:1px;border-color:#f4f4f4;border-radius:20px;” sk_overall_tablet=”padding-right:30px;margin-right:0px;”][cz_title bline=”cz_line_after_title” id=”cz_22511″ sk_lines=”background-color:#ba0230;height:2px;top:-10px;” sk_overall=”margin-bottom:14px;”]

Bryant Vasquez

[/cz_title]

Cybersecurity Consultant | DFARS & CMMC | NIST MEP | Information Security | MSIS at iMpact Utah

[/cz_content_box][cz_free_position_element hide_on_tablet=”true” hide_on_mobile=”true” css_top=”44.008190883190885%” css_left=”107.83333333333334%” id=”cz_73688″]
[/cz_free_position_element][cz_title id=”cz_83259″ sk_overall=”padding-left:30px;”]Speaker Bio: Bryant, A cybersecurity specialist with over 10 years of experience in his field. As the official cybersecurity representative of the NIST MEP National Network in Utah and a Cyber-AB registered practitioner for CMMC, Vásquez holds a Master of Science in Information Systems & Cybersecurity from the University of Utah. He is a proven expert in performing cybersecurity gap analyses, training clients in cybersecurity best practices, and helping organizations respond to cyber threats. Vásquez loves a new frontier to explore, whether it be through traveling or acquiring new knowledge. He enjoys several outdoor activities including hiking, biking, and playing soccer.”[/cz_title]
[cz_gap height=”1px” id=”cz_63589″ height_tablet=”50px”][cz_image image=”17283″ id=”cz_90537″ sk_css=”margin:0 auto;” sk_css_tablet=”margin-bottom:30px;”][/cz_image]
[cz_gap height=”100px”]
[cz_gap height=”100px”]
[cz_gap height=”110px” height_tablet=”100px” id=”cz_37266″][cz_title shape=”icon” shape_icon=”fas fa-lock” id=”cz_37712″ sk_shape=”color:rgba(186,2,48,0.19);”]

Les Olson IT

Security Summit Panel Discussion

[/cz_title][cz_title id=”cz_88389″]

Non-traditional Cyber Protections

 

John Huston Les Olson IT, David King iMpact Utah, Greg Murdock Sharp, and Jake Simonich Verkada.

[/cz_title][cz_gap height=”70px” height_tablet=”20px” height_mobile=”20px” id=”cz_62699″]

[cz_gap height_tablet=”10px” height_mobile=”10px”][cz_title id=”cz_68465″]

CYBERSECURITY MONTH BLOG ARTICLES

[/cz_title][cz_gap height_tablet=”10px” height_mobile=”10px”]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_104149″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2022/10/Insta1.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:https%3A%2F%2Flesolson.com%2Fblog%2Fthe-anatomy-of-a-data-breach-what-are-they-and-what-to-do-when-you-spot-one%2F|title:The%20Anatomy%20of%20a%20Data%20Breach%3A%20What%20are%20They%20and%20What%20to%20do%20When%20You%20Spot%20One%3F”][cz_title id=”cz_72712″ link=”url:https%3A%2F%2Flesolson.com%2Fblog%2Fthe-anatomy-of-a-data-breach-what-are-they-and-what-to-do-when-you-spot-one%2F|title:The%20Anatomy%20of%20a%20Data%20Breach%3A%20What%20are%20They%20and%20What%20to%20do%20When%20You%20Spot%20One%3F” sk_overall=”background-color:rgba(255,255,255,0.86);”]

WHAT IS A DATA BREACH

AND WHAT TO DO WHEN

YOU SPOT ONE

BLOG ARTICLE

[/cz_title][cz_social_icons fx=”cz_social_fx_10″ id=”cz_33651″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Fblog%2Fthe-anatomy-of-a-data-breach-what-are-they-and-what-to-do-when-you-spot-one%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_100279″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2022/10/insta.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-right:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:https%3A%2F%2Flesolson.com%2Fblog%2Fconcerned-about-cyber-4-easy-steps-for-staying-secure-in-2022%2F|title:Concerned%20About%20Cyber%3F%204%20Easy%20Steps%20for%20Staying%20Secure%20in%202022″][cz_title title_pos=”cz_title_pos_right” id=”cz_16897″ link=”url:%2Finfo%2Fhow-ransomware-critically-impacts-businesses%2F|||” sk_overall=”background-color:rgba(255,255,255,0.85);”]

4 EASY STEPS

FOR STAYING SECURE

BLOG ARTICLE

[/cz_title][cz_gap height=”27px” id=”cz_20875″][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_27357″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Download%22%2C%22link%22%3A%22https%3A%2F%2Flesolson.com%2Fblog%2Fconcerned-about-cyber-4-easy-steps-for-staying-secure-in-2022%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_103492″ sk_overall=”background-repeat:no-repeat;background-position:right top;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2022/11/CSworkplaces.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-bottom:35px;padding-left:50px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:https%3A%2F%2Flesolson.com%2Fblog%2F4-tips-to-keep-your-business-safe-and-secure%2F|title:Cybersecurity%20in%20the%20Workplace”][cz_title id=”cz_14720″ link=”url:https%3A%2F%2Flesolson.com%2Fblog%2F4-tips-to-keep-your-business-safe-and-secure%2F|title:Cybersecurity%20in%20the%20Workplace” sk_overall=”background-color:rgba(255,255,255,0.86);”]

CYBERSECURITY IN THE WORKPLACE

BLOG ARTICLE

[/cz_title][cz_social_icons fx=”cz_social_fx_10″ id=”cz_61304″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Fblog%2F4-tips-to-keep-your-business-safe-and-secure%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]

[cz_gap height=”30px” id=”cz_62034″][cz_content_box type=”1″ fx_hover=”fx_inner_line_hover” id=”cz_57469″ sk_overall=”background-repeat:no-repeat;background-position:left bottom;background-size:contain;background-image:url(https://lesolson.redpeppersoftware.net/wp-content/uploads/2022/11/SQUARE.png),linear-gradient(90deg,#f4f4f4,#f4f4f4);padding-top:50px;padding-right:50px;padding-bottom:35px;” back_content=”Quickly foster with resource maximizing” sk_back=”background-color:#ba0230;border-radius:10px;” sk_back_in=”color:#ffffff;” back_btn_link=”url:http%3A%2F%2Fxtratheme.com%2Ffashion-shop%2Fproducts%2F|||” sk_back_btn=”color:#000000;background-color:#ffffff;border-radius:4px;” sk_back_btn_hover=”color:#ffffff;background-color:rgba(0,0,0,0.76);” back_title=”59% OFF FOR WOMEN CLOTHES” back_btn_title=”Check Collection” link=”url:https%3A%2F%2Flesolson.com%2Fblog%2Fcybersecurity-in-the-home%2F|title:Cybersecurity%20in%20the%20Home”][cz_title title_pos=”cz_title_pos_right” id=”cz_90613″ link=”url:https%3A%2F%2Flesolson.com%2Fblog%2Fcybersecurity-in-the-home%2F|title:Cybersecurity%20in%20the%20Home” sk_overall=”background-color:rgba(255,255,255,0.85);”]

CYBERSECURITY IN THE HOME

BLOG ARTICLE

[/cz_title][cz_gap height=”27px” id=”cz_20875″][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_85854″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Download%22%2C%22link%22%3A%22%2Fblog%2Fcybersecurity-in-the-home%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]