Cybersecurity Audits: How to Know Your Exposure to Attacks Are you concerned about the IT security of your school? The first step to mitigate risk is to conduct a security audit of your entire IT environment. Working with your IT team or Managed Service Provider (MSP), you can review user accounts, update workstations and servers with recent patches, upgrade to the latest versions of your business software, and determine security technology gaps to ensure you are in the best position possible to avert and maintain operations if you are a cyberattack target. In this session, we will cover how you can know your exposure and the strategies that secure your IT systems. Tobin Kulangara has over six years of experience supporting clients in areas such as cybersecurity, identity management, networking, data recovery and Microsoft and Linux operating systems. He was instrumental in the remediation and restoration of IT operations from many schools and businesses during recent Independence Day cyberattack by REvil. Ed Sirignano has over 20 years of experience working with information technology. Ed joined Flagship Networks in 2008 and has been working with clients to develop their cybersecurity defenses and address critical threats. Ed led the development of Flagship’s Security Framework, which represents a comprehensive security lifecycle in which each function plays an essential role in defining controls, processes, and technologies to secure an organization. The framework is based on the National Institute of Standards and Technology’s (NIST) Cyber Security Framework (CSF). |