Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to part three in our sequence covering the key elements of an information security policy. Parts one and two, we covered one through six. Today, we’re going to cover seven, eight, and nine,...
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to part two in our sequence on the key elements of an information security policy. In part one, we covered the first three elements, the purpose and scope, data classification, roles and...
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our cybersecurity series. In the last segment, we talked about incident response plans, specifically tabletop exercises. So I wanted to take some time and step back a little bit...
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our leadership series. I wanted to go into a little bit more detail on the session we did on focus and execution just prior to the holiday in anticipation of our webinar...
Hi everyone, Scott Munden here from Huntleigh Technology Group. Welcome to this segment of our cybersecurity series. Today’s topic is incident response, very specifically tabletop exercises. So an incident response plan is going to include a lot of elements. And...
Download our FREE eBook “Cybersecurity: Five Simple Warning Signs You Can’t Ignore” to find out if you are properly protected against hackers and other online threats.
Thank you for your interest in HTG-Converge. We look forward to providing more details or answering any questions you have. Remember, you are always welcome to book a free appointment online if you prefer to have a discussion at your convenience.