
Upcoming Webinars
Check Back Soon!
Past Webinars
To Cloud or Not to Cloud: Make the Right Choice for Your Organization
May 2023
Don’t miss this opportunity to learn how cloud computing can help your organization stay agile, reduce costs, and improve efficiency. Whether you’re considering a move to the cloud or are already using cloud services, this webinar will provide valuable insights to help you make the best choices for your organization.
The Economics of Data Backup
February 2023
Are you curious what your current backup solution is costing you (or what it could cost you when a recovery is needed)?
Access our exclusive webinar The Economics of Data Backup to find out!
Bob Thomas, a cybersecurity expert, shares his insights on the causes of data loss, costs associated with lost data, and the varying ROI of different solutions.
Webinar registrants will receive:
- Complimentary data backup calculation
- A copy of the recording and webinar slide deck
- Exclusive insight on the economics of data backup
Crack the Hack 2022
Don’t Miss Out On the CyberSecurity Awareness Event of the Year!
Hear from seasoned cybersecurity veterans from Kyber Security, ConnectWise and Datto! The event features exclusive demos detailing live malware and ransomware recovery.
Learn how to plan for a sustainable cybersecurity program and identify the tools and strategies to effectively address security risks.
Access Webinar
Discussion of the Top 10 Most Common CMMC Gaps
September 2022
Description:
2023 is right around the corner, is your organization struggling to become CMMC compliant?
In this exclusive webinar, Bob Thomas, a cybersecurity expert, will share his observed keys to success and the most common mistakes he’s seen while working with DoD Prime and Subcontractors.
Sign up for the on-demand webinar and receive:
- A review to discuss how to ensure your company’s CMMC preparedness
- A copy of the recording and webinar slide deck
- Exclusive insight on the most common CMMC preparation mistakes.
Access Webinar.

[TANGO] Cyber Liability Insurance Premiums Are Exploding: How to Reduce Costs
April 2022
Description:
Come and learn from Kyber Security and NFP Property and Casualty on what is happening in the cyber liability insurance marketplace, what you can do to reduce your cost, and how a partnership with your network security team is more important than ever.
Access Webinar.

How to Reduce Cyber Risk: People, Process, Tech and Insurance
March 2022
In this presentation you will learn:
- The sophisticated threats that are driving this market shift.
- What cyber insurance policy requirements have providers been changing, and why.
- The evolution of cyber liability insurance and ransomware.
- The types of information that are at risk during a data breach.
- The basic controls that help keep you protected against sophisticated cyber threats while meeting cyber insurance requirements.
Access Webinar

How Connecticut’s New Cybersecurity Law Impacts Your Business
December 2021
The headlines are full of stories about website hacks that result in stolen data. Being a big company hardly seems to be a defense against these attacks. But small businesses are actually the bigger targets because their systems are often less sophisticated, less secure and subject to easier invasion. To protect their residents, many states including Connecticut have enacted new laws dealing with breaches of private information. While you may not think of your business as a collector of private information, you may be surprised what’s covered. As a business owner, you are now subject to new responsibilities in the event of a breach and more severe penalties when bad things happen if you have not prepared properly to protect your client data. Learn from cyber security experts what it takes to put the right safeguards in place to be shielded from both hackers and legal penalties.
Access Webinar.

The Circle of Trust: Protecting Your Organization With the NIST Cybersecurity Framework
November 2021
No matter the size of your company or organization, cybersecurity is a crucial element for continued success. We’ve designed this webinar to share the “how to’s” of cybersecurity as recommended by NIST, the National Institute of Standards and Technology.
You, your team, your company or community group will learn the steps for understanding cybersecurity risks and the steps to mitigate them. Your particular industry may have additional and related cybersecurity, regulatory and privacy recommendations, so as a best practice, the information that follows is intended to be customizable, flexible and non-regulatory.
Access Webinar.

TANGO: Overcoming Cybersecurity Challenges in a Hybrid Work Environment
October 2021
Over the last year, non-profit organizations have had to adapt to unprecedented change. One result of this change is the emergence of the hybrid work model. This flexible model comes with its own share of cybersecurity challenges, which stem from the blurry network perimeter created by employees using a mix of work and personal devices from their homes, offices, and other locations. As a result, many organizations are beginning to consider migrating resources to the cloud in an effort to better facilitate access for their dispersed workforce.
We’ll break down the key issues to focus on when updating cybersecurity policies and strengthening data protection measures, including:
- Incorporating new technology to support remote and office-based employees
- Additional access points and potential risks for unauthorized access
- Migrating resources to the cloud and associated security concerns
- Network security in the office and at remote locations
Access Webinar.
Your Inbox is for Sale: Business Email Compromise
May 2021
Panel discussion from May 2021 with business professionals with different perspectives on email security and business email compromise.
Access Webinar.
The NIST Cybersecurity Framework: 4 Step Guide
2019
The National Institute of Standards and Technology (NIST) is a government entity that created the Cyber Security Framework as a voluntary set of standards, guidelines, and practices designed to help organizations manage IT security risks. Companies of any size can utilize this framework to measure their cybersecurity practices relative to the threats they face. The NIST Cyber Security Framework (CSF) is comprised of five functions to help create plans to determine what to do before, during and after a cyber incident. The Framework is intended to compliment, not replace, an organization’s cybersecurity program. We developed a simple four step process to easily analyze and implement the Framework into your current program. Join us to learn how to establish goals, coordinate plans, and measure your success with the NIST CSF.
Access Webinar.
HIPAA Compliance is More than a Checkbox
2019
While many organizations may simply check a box to avoid regulatory fines, the true value is creating a secure environment to protect your data. The cost of a cyber breach expands further than simply monetary expenses; it could lead to down time, loss of reputation, and possibly even closed doors.
By following a comprehensive HIPAA program, you will be on the path to compliance and data security. Just like cybersecurity, compliance is ongoing and ever changing. A complete program includes an ongoing solution allowing you to continually enhance your cybersecurity posture while protecting your valuable data.
Access Webinar.
Windows 7 Vulnerabilities
2019
Don’t let Windows 7 weigh down your cyber defenses. Avoid massive security vulnerabilities by being proactive with your infrastructure upgrades. We will discuss the necessity of upgrading to Windows 10 before January 2020 and how to prepare for this big change.
Access Webinar.
The Road to GDPR Compliance
2018
Most SMBs wrongly believe they are not subject to GDPR compliance due to their size or customer base. There are three major reasons why SMBs should be ready to face the newest cybersecurity regulation:
1. You may already be subject
2. You never know when you may become subject
3. It’s just good business
In this webinar, we will lead you down the road to becoming GDPR compliant guiding through our methodology and integrated services.