SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
FIVE MOST FREQUENT
CYBERSECURITY OVERSIGHTS
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
SANCHEZ WILLIAMS
• Director Of IT Operations for U2Cloud
• Over 20 years experience in IT
• Former Security Architect for one of the 5 largest banks in the US
• 15 years of Private and Public Cloud experience
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
UNDERSTANDING CLOUD BASED ANTI-VIRUS
• Q: What AV protection is included with your Hosted
Servers/Desktops/Applications?
• A: Probably None
• (With the exception of built in AV such as Windows Defender)
• Many companies have Windows Defender disabled as part of their Group Policies due
to other AV’s run within the company
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
UNDERSTANDING OR MANAGING THE CLOUD
BASED FIREWALL
• Many SMB’s forget their Cloud Based services have a Firewall
• Left Unconfigured
• If Configured many unnecessary ports and services are left open after testing
and development has completed
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
UTILIZING TWO FACTOR AUTHENTICATION
• Phishing has become extremely sophisticated in 2019
• Many password compromises go unnoticed until it is to late
• Keyloggers are back in the mainstream
• Opensource and Free application EULA’s often give near unlimited access to a
mobile devices storage
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
PROPERLY TESTING BACKUPS
• According to a recent survey of 700 IT Professionals published by Spiceworks,
about 71 percent of companies do not test their plan more than once a year
• About 70 percent of Ransomware attacks in 2018 targeted small businesses,
with an average ransom demand of $116,000, according to a recent report
from Beazley Breach Response Services
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
EDUCATING STAFF
• Staff education is one of the most effective means of preventing a breach
• Sophisticated phishing attacks can be very hard to spot even for a trained
professional
• Brute force is rarely used in today’s age of abundant information
• Knowing who is in what position within a company is often as easy as checking LinkedIn
• This gives potential threats a plethora of information to infiltrate the company
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
QUESTIONS
• WWW.U2CLOUD.COM
• SWILLIAMS@U2CLOUD.COM
• 904-394-3910
BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD

Más contenido relacionado

La actualidad más candente

Common Security Misconception
Common Security MisconceptionCommon Security Misconception
Common Security MisconceptionMatthew Ong
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Unisys Corporation
 
(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2Rui Miguel Feio
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Rui Miguel Feio
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433Terry Gilsenan
 
National Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT ConsolidationNational Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT ConsolidationSolarWinds
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your DataErick Solms
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Rui Miguel Feio
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Sreejesh Madonandy
 
How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)Rui Miguel Feio
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your BusinessAll Covered
 
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2Rui Miguel Feio
 
Your Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the DatacenterYour Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the DatacenterIvanti
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...IBM Security
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerIBM Security
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesMrinal Wadhwa
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment LCpublicrelations
 

La actualidad más candente (20)

Common Security Misconception
Common Security MisconceptionCommon Security Misconception
Common Security Misconception
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014 Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
Don’t Sweat the Small Stuff – Protect What Matters Most - Interop 2014
 
(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2(2017) GDPR – What Does It Mean For The Mainframe v0.2
(2017) GDPR – What Does It Mean For The Mainframe v0.2
 
Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)Cyber security and the mainframe (v1.3)
Cyber security and the mainframe (v1.3)
 
terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433terry-gilsenan-pie-operating.10433
terry-gilsenan-pie-operating.10433
 
National Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT ConsolidationNational Government Webinar: Reap the Rewards of IT Consolidation
National Government Webinar: Reap the Rewards of IT Consolidation
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
 
Security challenges in 2017
Security challenges in 2017Security challenges in 2017
Security challenges in 2017
 
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
Share 2015 - 5 Myths that can put your Mainframe at risk (v1.3)
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
 
How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)How to Protect Your Mainframe from Hackers (v1.0)
How to Protect Your Mainframe from Hackers (v1.0)
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
 
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.22017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2
 
Your Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the DatacenterYour Datacenter at risk? – Patching for the Datacenter
Your Datacenter at risk? – Patching for the Datacenter
 
Mitigating the clicker
Mitigating the clickerMitigating the clicker
Mitigating the clicker
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
 
Uncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a HackerUncover What's Inside the Mind of a Hacker
Uncover What's Inside the Mind of a Hacker
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment
 

Similar a BITZ BOOTCAMP DC: Expo Showcase - U2Cloud

Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3Trish McGinity, CCSK
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surfaceJason Bloomberg
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseResilient Systems
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.AlgoSec
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfPhilSmith165
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptxsrikmhh
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersFrederik Lawson
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre EuclidesTI Safe
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 

Similar a BITZ BOOTCAMP DC: Expo Showcase - U2Cloud (20)

Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
The cyber house of horrors - securing the expanding attack surface
The cyber house of horrors -  securing the expanding attack surfaceThe cyber house of horrors -  securing the expanding attack surface
The cyber house of horrors - securing the expanding attack surface
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
 
Sholove cyren web security presentation2
Sholove cyren web security presentation2Sholove cyren web security presentation2
Sholove cyren web security presentation2
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
Under thehood
Under thehoodUnder thehood
Under thehood
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides[CLASS 2014] Palestra Técnica - Alexandre Euclides
[CLASS 2014] Palestra Técnica - Alexandre Euclides
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 

Más de Localogy

Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...Localogy
 
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...Localogy
 
LOCALOGY ENGAGE 19: Turning Customers Into Advocates
LOCALOGY ENGAGE 19: Turning Customers Into AdvocatesLOCALOGY ENGAGE 19: Turning Customers Into Advocates
LOCALOGY ENGAGE 19: Turning Customers Into AdvocatesLocalogy
 
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoomLOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoomLocalogy
 
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeberLOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeberLocalogy
 
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives SuccessLOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives SuccessLocalogy
 
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product DevelopmentLOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product DevelopmentLocalogy
 
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer JourneyLOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer JourneyLocalogy
 
BITZ BOOTCAMP DC: Welcome - Why Are You Here?
BITZ BOOTCAMP DC: Welcome - Why Are You Here? BITZ BOOTCAMP DC: Welcome - Why Are You Here?
BITZ BOOTCAMP DC: Welcome - Why Are You Here? Localogy
 
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...Localogy
 
BITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
BITZ BOOTCAMP DC: Smart Service - Winning the Customer ExperienceBITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
BITZ BOOTCAMP DC: Smart Service - Winning the Customer ExperienceLocalogy
 
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)Localogy
 
BITZ BOOTCAMP DC: Expo Showcase - Freshlime
BITZ BOOTCAMP DC: Expo Showcase - FreshlimeBITZ BOOTCAMP DC: Expo Showcase - Freshlime
BITZ BOOTCAMP DC: Expo Showcase - FreshlimeLocalogy
 
BITZ BOOTCAMP DC: CRM and Customer Insights
BITZ BOOTCAMP DC: CRM and Customer InsightsBITZ BOOTCAMP DC: CRM and Customer Insights
BITZ BOOTCAMP DC: CRM and Customer InsightsLocalogy
 
LSA19: The Location Factor — How Multi-Location Brands Win in Social
LSA19: The Location Factor — How Multi-Location Brands Win in SocialLSA19: The Location Factor — How Multi-Location Brands Win in Social
LSA19: The Location Factor — How Multi-Location Brands Win in SocialLocalogy
 
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising MixLSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising MixLocalogy
 
LSA19: Creating a Purpose Driven Culture
LSA19: Creating a Purpose Driven CultureLSA19: Creating a Purpose Driven Culture
LSA19: Creating a Purpose Driven CultureLocalogy
 
LSA19: The Science Behind Increasing Customer Retention
LSA19: The Science Behind Increasing Customer RetentionLSA19: The Science Behind Increasing Customer Retention
LSA19: The Science Behind Increasing Customer RetentionLocalogy
 
LSA19: The Role of Organic Content in the Consumer Buying Journey
LSA19: The Role of Organic Content in the Consumer Buying JourneyLSA19: The Role of Organic Content in the Consumer Buying Journey
LSA19: The Role of Organic Content in the Consumer Buying JourneyLocalogy
 
LSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
LSA19: Secrets of Marketing to Millennial Business Owners & Decision MakersLSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
LSA19: Secrets of Marketing to Millennial Business Owners & Decision MakersLocalogy
 

Más de Localogy (20)

Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
Mono Solutions Webinar - The Engagement Challenge: Simple Steps for Improving...
 
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
LOCALOGY ENGAGE 19: The Best Companies and PE Firms are Focused on Engagement...
 
LOCALOGY ENGAGE 19: Turning Customers Into Advocates
LOCALOGY ENGAGE 19: Turning Customers Into AdvocatesLOCALOGY ENGAGE 19: Turning Customers Into Advocates
LOCALOGY ENGAGE 19: Turning Customers Into Advocates
 
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoomLOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - LegalZoom
 
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeberLOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
LOCALOGY ENGAGE 19: SMBuy-in - Better Onboarding and Engagement - AWeber
 
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives SuccessLOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
LOCALOGY ENGAGE 19: SMBs and KPIs - Sharing Data that Drives Success
 
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product DevelopmentLOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
LOCALOGY ENGAGE 19: Bringing Customer Feedback into Product Development
 
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer JourneyLOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
LOCALOGY ENGAGE 19: AI’s Impact on the B2B Customer Journey
 
BITZ BOOTCAMP DC: Welcome - Why Are You Here?
BITZ BOOTCAMP DC: Welcome - Why Are You Here? BITZ BOOTCAMP DC: Welcome - Why Are You Here?
BITZ BOOTCAMP DC: Welcome - Why Are You Here?
 
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
BITZ BOOTCAMP DC: The Modern Customer Journey - Be Found Where your Customers...
 
BITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
BITZ BOOTCAMP DC: Smart Service - Winning the Customer ExperienceBITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
BITZ BOOTCAMP DC: Smart Service - Winning the Customer Experience
 
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
BITZ BOOTCAMP DC: Managing Cash Flow/Profits (aka Why You Are in Business)
 
BITZ BOOTCAMP DC: Expo Showcase - Freshlime
BITZ BOOTCAMP DC: Expo Showcase - FreshlimeBITZ BOOTCAMP DC: Expo Showcase - Freshlime
BITZ BOOTCAMP DC: Expo Showcase - Freshlime
 
BITZ BOOTCAMP DC: CRM and Customer Insights
BITZ BOOTCAMP DC: CRM and Customer InsightsBITZ BOOTCAMP DC: CRM and Customer Insights
BITZ BOOTCAMP DC: CRM and Customer Insights
 
LSA19: The Location Factor — How Multi-Location Brands Win in Social
LSA19: The Location Factor — How Multi-Location Brands Win in SocialLSA19: The Location Factor — How Multi-Location Brands Win in Social
LSA19: The Location Factor — How Multi-Location Brands Win in Social
 
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising MixLSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
LSA19: Amazon — Shifting Purchase Behaviors and the Advertising Mix
 
LSA19: Creating a Purpose Driven Culture
LSA19: Creating a Purpose Driven CultureLSA19: Creating a Purpose Driven Culture
LSA19: Creating a Purpose Driven Culture
 
LSA19: The Science Behind Increasing Customer Retention
LSA19: The Science Behind Increasing Customer RetentionLSA19: The Science Behind Increasing Customer Retention
LSA19: The Science Behind Increasing Customer Retention
 
LSA19: The Role of Organic Content in the Consumer Buying Journey
LSA19: The Role of Organic Content in the Consumer Buying JourneyLSA19: The Role of Organic Content in the Consumer Buying Journey
LSA19: The Role of Organic Content in the Consumer Buying Journey
 
LSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
LSA19: Secrets of Marketing to Millennial Business Owners & Decision MakersLSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
LSA19: Secrets of Marketing to Millennial Business Owners & Decision Makers
 

Último

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 

Último (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 

BITZ BOOTCAMP DC: Expo Showcase - U2Cloud

  • 1. FIVE MOST FREQUENT CYBERSECURITY OVERSIGHTS BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 2. SANCHEZ WILLIAMS • Director Of IT Operations for U2Cloud • Over 20 years experience in IT • Former Security Architect for one of the 5 largest banks in the US • 15 years of Private and Public Cloud experience BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 3. UNDERSTANDING CLOUD BASED ANTI-VIRUS • Q: What AV protection is included with your Hosted Servers/Desktops/Applications? • A: Probably None • (With the exception of built in AV such as Windows Defender) • Many companies have Windows Defender disabled as part of their Group Policies due to other AV’s run within the company BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 4. UNDERSTANDING OR MANAGING THE CLOUD BASED FIREWALL • Many SMB’s forget their Cloud Based services have a Firewall • Left Unconfigured • If Configured many unnecessary ports and services are left open after testing and development has completed BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 5. UTILIZING TWO FACTOR AUTHENTICATION • Phishing has become extremely sophisticated in 2019 • Many password compromises go unnoticed until it is to late • Keyloggers are back in the mainstream • Opensource and Free application EULA’s often give near unlimited access to a mobile devices storage BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 6. PROPERLY TESTING BACKUPS • According to a recent survey of 700 IT Professionals published by Spiceworks, about 71 percent of companies do not test their plan more than once a year • About 70 percent of Ransomware attacks in 2018 targeted small businesses, with an average ransom demand of $116,000, according to a recent report from Beazley Breach Response Services BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 7. EDUCATING STAFF • Staff education is one of the most effective means of preventing a breach • Sophisticated phishing attacks can be very hard to spot even for a trained professional • Brute force is rarely used in today’s age of abundant information • Knowing who is in what position within a company is often as easy as checking LinkedIn • This gives potential threats a plethora of information to infiltrate the company BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD
  • 8. QUESTIONS • WWW.U2CLOUD.COM • SWILLIAMS@U2CLOUD.COM • 904-394-3910 BY SANCHEZ WILLIAMS: DIRECTOR OF IT OPERATIONS U2CLOUD