PamTen Inc. is offering a free Cybersecurity webinar:
How to Build Strong Cyber Policies – How to develop and implement actionable cyber policies on Wednesday, January 6, 2021 from 12 – 1 pm EST.
The Internet and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need strong cybersecurity policies and a strategy to protect their own organization, customers, and data from growing cybersecurity threats. With an increase of over 424% in cyberattacks on small businesses in the past year, it is important that companies start 2021 with an actionable plan to help inform and guide their employees to prevent the growing number of breaches and attacks.
Attendees in this webinar will learn:
This webinar is free,Register Now.
The webinar will be presented by John Mendes, who is the Senior VP of Information Security at PamTen, and has 20 years of experience delivering professional services to clients in Life Sciences, Telecommunications and Financial Services. Specialties include Information Assurance, Risk Management, Enterprise Content Management and Systems Integration. John is Certified in Risk and Information Systems Control (CRISC), Certified Data Privacy Practitioner (CDPP), and is a certified Project Management Professional (PMP). He is an active member of various professional groups including: Project Management Institute (PMI) and ISACA.
John will be joined by Don Philmlee, Information/Cyber Security SME, has a broad range of deep experience finding and making useful technology work successfully. He is the founder and manager of a hands-on technology consultancy and provides strategic technology services for Cybersecurity and technology-related maturity assessments. Don is a certified Project Management Professional (PMP) since 2006 and a Certified Information Systems Security Professional (CISSP) since 2003. He is an active member of Project Management Institute (PMI), International Information System Security Certification Consortium (ISC2), Information Systems Audit and Control Association (ISACA), and the Society of Industrial Security Professionals (NCMS).