Learn about Cybersecurity and the steps you can take to Protect your Business
[/cz_title][cz_gap height=”65px” height_tablet=”10px” height_mobile=”10px”]
Les Olson IT
Security Summit Details
[/cz_title][cz_gap height=”70px” height_tablet=”20px” height_mobile=”20px” id=”cz_62699″]
This year, Cybersecurity Awareness Month’s main focal areas revolve around four key fundamental cybersecurity best practices:
[/cz_title][cz_gap height=”41px”]
Les Olson IT
Security Summit Keynote Speaker Videos
[/cz_title][cz_gap height=”70px” height_tablet=”20px” height_mobile=”20px” id=”cz_62699″]
Charles Kikumoto
[/cz_title]
Executive Risk Practice Leader at Moreton & Company
Natalie Suarez
[/cz_title]
Principal Solution Advisor at ConnectWise
Garrett Gross
[/cz_title]
Sr Director, Technical sales at Huntress
Prior to that, Garrett has held a variety of technical responsibilities, including technical support, systems administration, network engineering, penetration testing, tools development, and building/leading security operations teams.
Garrett also serves as advisor to several security firms, contributes regularly to podcasts/webinars, competes in CTFs, and looks for ways to mentor those starting out in the security industry.[/cz_title]
Bryant Vasquez
[/cz_title]
Cybersecurity Consultant | DFARS & CMMC | NIST MEP | Information Security | MSIS at iMpact Utah
Les Olson IT
Security Summit Panel Discussion
[/cz_title][cz_title id=”cz_88389″]
Non-traditional Cyber Protections
John Huston Les Olson IT, David King iMpact Utah, Greg Murdock Sharp, and Jake Simonich Verkada.
[/cz_title][cz_gap height=”70px” height_tablet=”20px” height_mobile=”20px” id=”cz_62699″]
CYBERSECURITY MONTH BLOG ARTICLES
[/cz_title][cz_gap height_tablet=”10px” height_mobile=”10px”]
WHAT IS A DATA BREACH
AND WHAT TO DO WHEN
YOU SPOT ONE
BLOG ARTICLE
[/cz_title][cz_social_icons fx=”cz_social_fx_10″ id=”cz_33651″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Fblog%2Fthe-anatomy-of-a-data-breach-what-are-they-and-what-to-do-when-you-spot-one%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]
4 EASY STEPS
FOR STAYING SECURE
BLOG ARTICLE
[/cz_title][cz_gap height=”27px” id=”cz_20875″][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_27357″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Download%22%2C%22link%22%3A%22https%3A%2F%2Flesolson.com%2Fblog%2Fconcerned-about-cyber-4-easy-steps-for-staying-secure-in-2022%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]
CYBERSECURITY IN THE WORKPLACE
BLOG ARTICLE
[/cz_title][cz_social_icons fx=”cz_social_fx_10″ id=”cz_61304″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Watch%22%2C%22link%22%3A%22%2Fblog%2F4-tips-to-keep-your-business-safe-and-secure%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_62034″]
CYBERSECURITY IN THE HOME
BLOG ARTICLE
[/cz_title][cz_gap height=”27px” id=”cz_20875″][cz_social_icons position=”tar” fx=”cz_social_fx_10″ id=”cz_85854″ social=”%5B%7B%22icon%22%3A%22fa%20fa-arrow-circle-right%22%2C%22title%22%3A%22Download%22%2C%22link%22%3A%22%2Fblog%2Fcybersecurity-in-the-home%2F%22%7D%5D” sk_icons=”font-size:50px;color:#ba0230;” sk_con=”padding-top:0px;padding-bottom:0px;margin-top:0px;margin-bottom:0px;”][/cz_content_box][cz_gap height=”30px” id=”cz_20875″]