Network
Our mission is your success: Making complex Cyber & Privacy issues understandable and actionable!

Recent Talks for Network Administrators
Georgia Hospital Association Security Leader’s Roundtable
Business Email Compromise (BEC)
Intelligence Briefing Business Email Compromise- PowerPoint
RansomWare
Intelligence Briefing RansomWare
Resources for IT Directors
SunTrust_10_BestPractices_Fraud_Protection
Best Practices_Reporting_Cyber_Incidents
Best Practices_Fraud_Prevention
(Fire eye) Mandiant Incident Response Retainer Services
GCC GAIN / IT Leadership
What your staff need to know Mobile and Social media security
Securing your IT systems from
Your Security Online_Practical_Guide
AntimalwareProtectionEvolvingThreats
MOBILE DEVICE SECURITY FOR ENTERPRISES
ASIS International and (ISC)2
BYO-Insecurity to BYO-Security PPT
BYO- Frist Posters In PDF Format
Southern Union IT November 2013
BYOD Best Practices Presentation
Cisco International Mobile Security Survey
Continuous Security for High Edu
GetCyberSafe Guide for Small and Medium Businesses
Hidden Costs in Managing Wireless Networks
Mobile Workforce Adoption Trends
Archive of Talks for Network Administrators
If you would like a copy of any of the materials listed in any of the talks and presentations below please contact me.
Nebraska State June 2013
NE State 2013 Best Practices PPT
BYOInsecurity Wireless Afternoon Lab
BYO(D) Managment and Control Morning Lab
Resources
12 Steps to Bring Your Own Device (BYOD) Success
Advanced Threat Report-Fire eye
Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
ARP Spoofing Tutorial
BYOD-Trends
Defending Against Compromised Certificates
Defence against Drive-By Downloads
FAQ for Small and Medium Business Mobile Security
Forrester How iPads Are Opening the Doors to Hackers
Hacking Tools
Hardening Authentication
Hardening Network Infrastructure
Internet Security Threat Report 2013
IPV6 Firewall Requirements
Minimize Effectiveness of SQL Injection Attacks
Mitigations Guidance for Distributed Denial of Service Attacks
Monitoring Your Infrastructure
Port Security on Cisco Access Switches
Protect Against Cross Site Scripting (XSS) Attacks
Reducing the Effectiveness of Pass-the-Hash
Security Information Management Systems and Application Monitoring
Service Oriented Architecture Security Vulnerabilities - Web Services
Sophos Mobile Device Security
White Paper-Disaster Preparedness
WIFI Best Practices To-Do list for home users