• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360
    • Student360
    • Past Events
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Why sponsor?
    • Sponsor Presentations
    • Start-up Corner
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Guest Posts

Business in the crosshairs of cyber criminals – protecting your digital assets, part 1

January 11, 2013 by Bob Weiss

This is part one in a two-part series on protecting digital assets. Many computer criminals are targeting small and medium size businesses because they have more valuable assets to steal than consumers, and their security is generally much weaker than large enterprise companies. A small business represents a fat and easy victim to criminal hackers.  […]

Filed Under: Guest Posts

Let’s be honest; let’s talk about what’s happening

January 8, 2013 by Michael Kelly

Today’s cyber security landscape is littered with regulations, best-practices, arms races and ever-increasingly complex technology tools. As technologies advance, so must the controls we use to secure them. To this end, companies do the obvious; they educate people in technologies and securities, they implement the myriad tools and processes required to keep up, to keep […]

Filed Under: Guest Posts

Speaking to non-IT people

December 26, 2012 by David Mann

As a security professional, you’re working in a field that most of us would consider highly technical. In other words, when you speak to a someone who doesn’t share your technical expertise there’s a good chance much is lost in translation. When this happens, important client relationships can be affected, processes can become cumbersome, and […]

Filed Under: Guest Posts

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 5
  • Go to page 6
  • Go to page 7

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: The diversity problem stars in K-12 #HourOfCode #CSEdWeek https://t.co/QbkMM2chgi
    about 9 hours ago

  2. Secure360 Conference
    Secure360 Conference: The 'Hour of Code' is a nationwide initiative by Computer Science Education Week [https://t.co/kecOyq1dPr] and… https://t.co/UCrc5ddZTZ
    about 14 hours ago

  3. Secure360 Conference
    Secure360 Conference: From #Sec360 Diamond Sponsor @Cisco: Why We Must Get Data Privacy Right https://t.co/6LmRILTCjL https://t.co/oiFFGtfHXZ
    about 18 hours ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2019 Secure360. All rights reserved.