What is Cyber Security?

• Workshop Room 5

Understanding what it means to be secure in this evolving landscape of Cyber Security with: Risk Assessment(s); Continuous Monitoring; Phishing Awareness; Enhanced Access Control; End-to-End Encryption; Response Team; Threat Intelligence; Adherence to Standards; Cloud-Specific Measures; Communication Protocols; Transparency.

Presented by:

Keith Stephenson Director of Business Development, Texas Data and VoIP Security

Keith has been fortunate enough to work with Tom & Dana; by taking enterprise technology solutions and bringing them to businesses not only local, but nationally as well. He feels that when you spend the time and energy that you would on any sized client, the opportunities for that client to grow are endless! He works for Texas Data And VoIP Security a family owned and operated managed security service provider licensed by the State of Texas DPS (#C04097401) as Private Investigators, specializing in: digital forensics; cybersecurity remediation and implementation; VoIP Phone Services; Network Cabling projects.

Keith has been fortunate enough to work with Tom & Dana; by taking enterprise technology solutions and bringing them to businesses not only local, but nationally as well. He feels that when you spend the time and energy that you would on any sized client, the opportunities for that client to grow are endless! He works for Texas Data And VoIP Security a family owned and operated managed security service provider licensed by the State of Texas DPS (#C04097401) as Private Investigators, specializing in: digital forensics; cybersecurity remediation and implementation; VoIP Phone Services; Network Cabling projects.