First Fridays with Raj – SOP Culture – Generating Scheduled Security Compliance Reports

Category: Security

First Fridays with Raj – SOP Culture – Generating Scheduled Security Compliance Reports

First Fridays with Raj – SOP Culture – Generating Scheduled Security Compliance Reports

First Fridays with Raj: SOP Culture – Generating Scheduled Security Compliance Reports February 12, 2016 at 10:00AM NEW DATE FOR FEBRUARY’S FIRST FRIDAY: FEBRUARY 12, 2016! Everybody knows that our clients are subject to increasing regulations. And we all know that we need to conduct periodic assessments to show the current state of information security […]

From the Trenches – End-Uses: The Wildcard in Placing Your Data in the Cloud

From the Trenches – End-Uses: The Wildcard in Placing Your Data in the Cloud

From the Trenches – End-Uses: The Wildcard in Placing Your Data in the Cloud Date: Tuesday, November 24, 2015 Time: 1:00pm Eastern / Duration: 60 minutes While compliance frameworks and corporate edicts are well and good, many companies are seeing their intellectual property and other sensitive information being placed in the cloud….all without the knowledge […]

Payroll Heists, Cybercriminals, and You: Best Practices in Protecting Your Organization

Payroll Heists, Cybercriminals, and You: Best Practices in Protecting Your Organization

October 22, 2015 – 8:30am – 10:00am National American Payroll Association/Long Island Chapter Seminar Raj Will Present: Payroll Heists, Cybercriminals, and You: Best Practices in Protecting Your Organization There are only 2 kinds of people. People who are about to be hacked; and those who’ll be hacked again. It’s as simple as that – either […]

Panopticon 2015: Continued Erosion of Privacy Rights (and Occasional Victories)

Panopticon 2015: Continued Erosion of Privacy Rights (and Occasional Victories)

61st Annual ASIS International Seminar in Anaheim, CA Panopticon 2015: Continued Erosion of Privacy Rights (and Occasional Victories) presented by Raj Goel Download Presentation (PDF)

Raj is quoted in CIO.com’s article “Why CIOs should worry about the Internet of Things” by Jonathan Hassell

Raj is quoted in CIO.com’s article “Why CIOs should worry about the Internet of Things” by Jonathan Hassell

The Internet of Things brings with it the promise gee-whiz applications and life-changing innovation. But one thing’s for sure – there are as many questions as there will be gigabytes of data being poured into your data centers. The Internet of Things (IoT) has the promise to make everything more intelligent and efficient. Smart grids, […]

Raj is quoted in a Channelnomics article “Security about livelihoods, not data” by Jessica Meek in Las Vegas

Raj is quoted in a Channelnomics article “Security about livelihoods, not data” by Jessica Meek in Las Vegas

Raj is quoted in a Channelnomics article “Security about livelihoods, not data” by Jessica Meek in Las Vegas September 29, 2015 Risk of losing income greater than risk of losing data, panelists debate. Security is not about data being at risk, but livelihoods, partners heard at Continuum Navigate 2015 in Las Vegas today. During a […]

2015 Trends in Financial Crimes

2015 Trends in Financial Crimes

Trends in Financial Crimes – How insecure software, poor development practices and poor management enable cybercrime, Raj Goel Why does SPAM exist? What types of crimes are we enabling by use and misuse of social media? How are small businesses, churches and schools being robbed of hundreds of thousands of dollars? And what do warehouses […]

Tech analyst on Ashley Madison hack: ‘Internet security is an oxymoron – it does not exist’

Tech analyst on Ashley Madison hack: ‘Internet security is an oxymoron – it does not exist’

Article by Jay Dow, PIX11, July 21st, 2015 You find your way to the dating website Ashley Madison because either you’re married – or attached – but still want to date secretly – without worrying that your spouse or significant other will find out. So imagine when the website that advertises itself as an online […]

Always On, Always Moving – Securing the Mobile Workforce

Always On, Always Moving – Securing the Mobile Workforce

The rapid rise of mobile computing has caused more sleepless nights for security professionals than they would care to admit. Laptops, smart phones, tablets… most employees have one of each, and each needs to be protected. What are the best strategies to enable threat prevention for your mobile workforce? What exactly are the threats being […]