SlideShare a Scribd company logo
1 of 16
Assessing Security and ComplianceRisk for Acquisitions and Mergers June 22, 2011
Agenda ,[object Object]
Risk Evaluation Opportunities
Planning Activities
Prioritizing Risk Review – Compliance, BC and DR, IT security
IT Compliance
Business Continuity and Disaster Recovery
IT Risk Assessment
Risk Action Plan
Lessons Learned2 Confidential
Recent History Q2 2010… ,[object Object]
80% of revenue coming from broadband/dial subs, 20% from business
Declining business – 3% monthly churn
Generated $811M+ in cash between 6/2007 and 9/2010 -35% margin in 2010Last Six Months…Nearly $1B in M&A Activity! ,[object Object]
STS Telecom- 3/2/2010
One Communications - 4/1/2011

More Related Content

What's hot

Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolHernan Huwyler, MBA CPA
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Tripwire
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security ManagementEC-Council
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityWalls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityAbdul Jaleel
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Qa Financials - 10 Smart Controls for Software Development
Qa Financials  - 10 Smart Controls for Software DevelopmentQa Financials  - 10 Smart Controls for Software Development
Qa Financials - 10 Smart Controls for Software DevelopmentHernan Huwyler, MBA CPA
 
Enterprise IT Security Audit | Cyber Security Services
Enterprise IT Security Audit | Cyber Security ServicesEnterprise IT Security Audit | Cyber Security Services
Enterprise IT Security Audit | Cyber Security ServicesAkshay Kurhade
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 

What's hot (20)

02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
Master Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines SchoolMaster Class Cyber Compliance IE Law School IE Busines School
Master Class Cyber Compliance IE Law School IE Busines School
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
CMMC Breakdown
CMMC BreakdownCMMC Breakdown
CMMC Breakdown
 
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
Industrial Cyber Security: What You Don't Know Might Hurt You (And Others...)
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Walls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application SecurityWalls of Steel, Doors of Wood - Relevance of Application Security
Walls of Steel, Doors of Wood - Relevance of Application Security
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Qa Financials - 10 Smart Controls for Software Development
Qa Financials  - 10 Smart Controls for Software DevelopmentQa Financials  - 10 Smart Controls for Software Development
Qa Financials - 10 Smart Controls for Software Development
 
Enterprise IT Security Audit | Cyber Security Services
Enterprise IT Security Audit | Cyber Security ServicesEnterprise IT Security Audit | Cyber Security Services
Enterprise IT Security Audit | Cyber Security Services
 
Robert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight sessionRobert Carey, Principal Deputy CIO, DOD Insight session
Robert Carey, Principal Deputy CIO, DOD Insight session
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 

Viewers also liked

Tag Community Board Presentation
Tag Community Board PresentationTag Community Board Presentation
Tag Community Board PresentationMelanie Brandt
 
Acquisition Risk Analysis
Acquisition Risk AnalysisAcquisition Risk Analysis
Acquisition Risk AnalysisOmniaParatus
 
Group IB table of elements
Group IB table of elementsGroup IB table of elements
Group IB table of elementsVivien Vivien
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsMetro Technology Centers
 
Cybersecurity: The New Priority for Business
Cybersecurity: The New Priority for BusinessCybersecurity: The New Priority for Business
Cybersecurity: The New Priority for BusinessLeanne Fuith
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec
 
الحرب الالكترونية
الحرب الالكترونية الحرب الالكترونية
الحرب الالكترونية hafz1180
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولSaadDongus
 
أساسيات الحرب الألكترونية
أساسيات الحرب الألكترونيةأساسيات الحرب الألكترونية
أساسيات الحرب الألكترونيةNaser Elmisbah
 
قياسات المعلومات في مطلع القرن الواحد والعشرين
قياسات المعلومات في مطلع القرن الواحد والعشرينقياسات المعلومات في مطلع القرن الواحد والعشرين
قياسات المعلومات في مطلع القرن الواحد والعشرينAbdulrahman Farrag
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلوماتToto Tarik
 
عرض قياسات المكتبات وعلاقتها بقياسات النشاط العلمي
عرض قياسات المكتبات وعلاقتها بقياسات النشاط العلميعرض قياسات المكتبات وعلاقتها بقياسات النشاط العلمي
عرض قياسات المكتبات وعلاقتها بقياسات النشاط العلميosama gharieb
 
information security
information securityinformation security
information securityMoamen Ayyad
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلوماتMohammed Almeshekah
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMSBusiness Beam
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005ControlCase
 

Viewers also liked (20)

Tag Community Board Presentation
Tag Community Board PresentationTag Community Board Presentation
Tag Community Board Presentation
 
Acquisition Risk Analysis
Acquisition Risk AnalysisAcquisition Risk Analysis
Acquisition Risk Analysis
 
Group IB table of elements
Group IB table of elementsGroup IB table of elements
Group IB table of elements
 
KASYS ISMS intro.
KASYS ISMS intro.KASYS ISMS intro.
KASYS ISMS intro.
 
Become a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade SchoolsBecome a Cyber Security Professional at Our Oklahoma Trade Schools
Become a Cyber Security Professional at Our Oklahoma Trade Schools
 
Kasys crm- 1 slide
Kasys crm- 1 slideKasys crm- 1 slide
Kasys crm- 1 slide
 
Cybersecurity: The New Priority for Business
Cybersecurity: The New Priority for BusinessCybersecurity: The New Priority for Business
Cybersecurity: The New Priority for Business
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
2-sec "A Day in the Life of a Cyber Security Professional" Interop London Jun...
 
الحرب الالكترونية
الحرب الالكترونية الحرب الالكترونية
الحرب الالكترونية
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلول
 
أساسيات الحرب الألكترونية
أساسيات الحرب الألكترونيةأساسيات الحرب الألكترونية
أساسيات الحرب الألكترونية
 
قضايا معرفية في الأمن السبراني
قضايا معرفية في الأمن السبرانيقضايا معرفية في الأمن السبراني
قضايا معرفية في الأمن السبراني
 
قياسات المعلومات في مطلع القرن الواحد والعشرين
قياسات المعلومات في مطلع القرن الواحد والعشرينقياسات المعلومات في مطلع القرن الواحد والعشرين
قياسات المعلومات في مطلع القرن الواحد والعشرين
 
امن المعلومات
امن المعلوماتامن المعلومات
امن المعلومات
 
عرض قياسات المكتبات وعلاقتها بقياسات النشاط العلمي
عرض قياسات المكتبات وعلاقتها بقياسات النشاط العلميعرض قياسات المكتبات وعلاقتها بقياسات النشاط العلمي
عرض قياسات المكتبات وعلاقتها بقياسات النشاط العلمي
 
information security
information securityinformation security
information security
 
أساسيات أمن المعلومات
أساسيات أمن المعلوماتأساسيات أمن المعلومات
أساسيات أمن المعلومات
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 

Similar to Assessing IT Security and Compliance Risk for Acquisitions and Mergers

CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk ManagementAhmed Sayed-
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy Menezes
 
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfThomasBronack
 
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...Nagios
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdfThomasBronack
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachProtected Harbor
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterPhil Agcaoili
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Michael Ofarrell
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 

Similar to Assessing IT Security and Compliance Risk for Acquisitions and Mergers (20)

CEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementCEP and SOA: An Open Event-Driven Architecture for Risk Management
CEP and SOA: An Open Event-Driven Architecture for Risk Management
 
GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018GRCAlert Capabilities Deck - 2018
GRCAlert Capabilities Deck - 2018
 
Security & Risk Management
Security & Risk ManagementSecurity & Risk Management
Security & Risk Management
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-3-2023.pdf
 
Komal Vora
Komal VoraKomal Vora
Komal Vora
 
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
Nagios Conference 2013 - Jorge Higueros - Trust Management in Monitoring Fina...
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdfBronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
Bronack Skills - Risk Management and SRE v1.0 12-10-2023.pdf
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
The Cost of Downtime
The Cost of DowntimeThe Cost of Downtime
The Cost of Downtime
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 

More from Melanie Brandt

Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Melanie Brandt
 
Presentations seeking angel investment presentation (charlie paparelli)
Presentations   seeking angel investment presentation (charlie paparelli)Presentations   seeking angel investment presentation (charlie paparelli)
Presentations seeking angel investment presentation (charlie paparelli)Melanie Brandt
 
Presentations seeking angel investment presentation (charlie paparelli)
Presentations   seeking angel investment presentation (charlie paparelli)Presentations   seeking angel investment presentation (charlie paparelli)
Presentations seeking angel investment presentation (charlie paparelli)Melanie Brandt
 
Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Melanie Brandt
 
Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Melanie Brandt
 
Wain kellum presentation
Wain kellum presentationWain kellum presentation
Wain kellum presentationMelanie Brandt
 
TAG infrastructure society logistics presentation by Page Siplon
TAG infrastructure society logistics presentation by Page SiplonTAG infrastructure society logistics presentation by Page Siplon
TAG infrastructure society logistics presentation by Page SiplonMelanie Brandt
 
So co water - energy tag ses 120716 final
So co   water - energy tag ses 120716 finalSo co   water - energy tag ses 120716 final
So co water - energy tag ses 120716 finalMelanie Brandt
 
Ras ses water energy july 26 2012 final
Ras   ses water energy july 26 2012 finalRas   ses water energy july 26 2012 final
Ras ses water energy july 26 2012 finalMelanie Brandt
 
Open text tag_bpm 04-12 v3
Open text tag_bpm 04-12 v3Open text tag_bpm 04-12 v3
Open text tag_bpm 04-12 v3Melanie Brandt
 
Yogendra joshi ga_tech
Yogendra joshi ga_techYogendra joshi ga_tech
Yogendra joshi ga_techMelanie Brandt
 
Wally phelps adaptiv_cool
Wally phelps adaptiv_coolWally phelps adaptiv_cool
Wally phelps adaptiv_coolMelanie Brandt
 

More from Melanie Brandt (20)

Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
 
Presentations seeking angel investment presentation (charlie paparelli)
Presentations   seeking angel investment presentation (charlie paparelli)Presentations   seeking angel investment presentation (charlie paparelli)
Presentations seeking angel investment presentation (charlie paparelli)
 
Presentations seeking angel investment presentation (charlie paparelli)
Presentations   seeking angel investment presentation (charlie paparelli)Presentations   seeking angel investment presentation (charlie paparelli)
Presentations seeking angel investment presentation (charlie paparelli)
 
Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014
 
Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014Patent introduction and overview atlanta january 2014
Patent introduction and overview atlanta january 2014
 
Wain kellum presentation
Wain kellum presentationWain kellum presentation
Wain kellum presentation
 
TAG infrastructure society logistics presentation by Page Siplon
TAG infrastructure society logistics presentation by Page SiplonTAG infrastructure society logistics presentation by Page Siplon
TAG infrastructure society logistics presentation by Page Siplon
 
So co water - energy tag ses 120716 final
So co   water - energy tag ses 120716 finalSo co   water - energy tag ses 120716 final
So co water - energy tag ses 120716 final
 
Ras ses water energy july 26 2012 final
Ras   ses water energy july 26 2012 finalRas   ses water energy july 26 2012 final
Ras ses water energy july 26 2012 final
 
Gbr ge panel 07 26-12
Gbr ge panel 07 26-12Gbr ge panel 07 26-12
Gbr ge panel 07 26-12
 
Open text tag_bpm 04-12 v3
Open text tag_bpm 04-12 v3Open text tag_bpm 04-12 v3
Open text tag_bpm 04-12 v3
 
Mc kenneys gatech
Mc kenneys gatechMc kenneys gatech
Mc kenneys gatech
 
Mc kenneys gatech
Mc kenneys gatechMc kenneys gatech
Mc kenneys gatech
 
Kevin burke apc
Kevin burke apcKevin burke apc
Kevin burke apc
 
Yogendra joshi ga_tech
Yogendra joshi ga_techYogendra joshi ga_tech
Yogendra joshi ga_tech
 
Wally phelps adaptiv_cool
Wally phelps adaptiv_coolWally phelps adaptiv_cool
Wally phelps adaptiv_cool
 
Steve hammond nrel
Steve hammond nrelSteve hammond nrel
Steve hammond nrel
 
Scott wilson hp_cfs
Scott wilson hp_cfsScott wilson hp_cfs
Scott wilson hp_cfs
 
Ron hutchins ga_tech
Ron hutchins ga_techRon hutchins ga_tech
Ron hutchins ga_tech
 
Ortiz internap
Ortiz internapOrtiz internap
Ortiz internap
 

Assessing IT Security and Compliance Risk for Acquisitions and Mergers