JavaScript Usage Statistics 2024 - The Ultimate Guide
Audit summary from security solutions and ovation tech
1. Hear from the experts. Learn your risk. Activate your scorecard. Plan your roadmap.
Join us for a day of reality shifting education about Cyber Risk vulnerabilities and cost to your business.
Connect with C-level peers. Find solutions.
Meet top experts in the field from the FBI, Washington state and the U.S. Department of the Treasury,
crisis communications experts, financial projection strategists, private investigators, attorneys,
business leaders, Cloud computing specialists and more.
Leaders: Engage Your Organization
OCTOBER 30TH 2014
BELLINGHAM, WASHINGTON
7:30 AM-5:30 PM WHATCOM COMMUNITY COLLEGE
cyberrisksummit.org
2. You are sending your key staff to
the conference to help shift your
understanding of the cyber threat.
We want you to walk away from
the day with a tool kit for your use.
Our partners Ovation Technical
Services and Security Solutions
are here to help you bridge that gap.
Your Organization. Your Risks. Your Complimentary Audit
from the Experts in physical & cyber security
SCOPE
PREMISES AUDIT * LOCKS AND KEY MANAGEMENT * ACCESS MANAGEMENT & CONTROL * SITE MONITORING AND SURVEILLANCE * FIRE MONITORING AND ALARM SYSTEMS * INTRUSION DETECTION AND ALARMS * IT SYSTEMS AUDIT * INTRUSION PROTECTION AND DETECTION SYSTEMS * MALWARE PROTECTION * PASSWORD MANAGEMENT AND CONTROL * DOCUMENT MANAGEMENT AND CONTROL * MOBILE DEVICE MANAGEMENT AND CONTROL * BACKUP SYSTEMS * SYSTEM UPDATE LEVELS * EMPLOYEE TRAINING AND COMPLIANCE VERIFICATION
WHAT YOU GET
EXECUTIVE AND DETAILED LEVEL REPORT COVERING
MAJOR FINDINGS (GOOD/BAD) * MINOR ISSUES TO INVESTIGATE* RECOMMENDED ACTIONS (PRIORITIZED) * DURATION: ½ DAY
REQUIREMENTS
HOUR FOR INTERVIEW OF SITE MANAGER AND IT MANAGER * ACCESS TO SITE FACILITIES AND PERIMETER * ACCESS TO SERVER SYSTEM (AN AUTOMATED SCANNER WILL BE USED FOR PORTIONS OF THE IT AUDIT) * COMPANY SIZE: 5 EMPLOYEES OR MORE