CMMC Tools Tactics and Technology

Webinar: CMMC Tools, Tactics, and Technology–July 29th, Noon

Posted Posted in Cybersecurity, Security, Strategy

Free Webinar: CMMC Tools, Tactics, and Technology
Thursday, July 29th, 12:00 noon to 12:45 PM PDT
Presenter:  Pat Cooke, Principal – EXP Technical
REGISTER HERE
The NIST 800-171 framework and Cybersecurity Maturity Model Certification (CMMC) present formidable challenges for small and medium-sized businesses seeking certification.
In this webinar, Pat […]

Hybrid Workforce Webinar Announcement

Technology Solutions for the Hybrid Workforce Webinar Now Available Streaming on Demand

Posted Posted in Cloud, Cloud Strategies, Cybersecurity, Office 365, Security, Strategy, VDI

On June 17th, EXP technical hosted a webinar entitled “Technology Solutions for the Hybrid Workforce.” The content of this webinar is now available on demand, in video and a transcript below:

Technology Solutions for the Hybrid Workforce
Webinar Transcript
Introductions
KELLY PALETTA:
Good afternoon, everyone. My name is Kelly Paletta. […]

Hybrid Workforce Webinar Announcement

Webinar: Technology Solutions for the Hybrid Workforce

Posted Posted in Cloud Strategies, Cybersecurity, High Rewards, Project, Security, Strategy, VDI

Registration for this event is closed. You can now view the webinar streaming on demand accompanied by a text transcript HERE.
What is the hybrid workforce?How will on-premises/remote hybrid work shape business operations in the post-pandemic era?What innovations will market leaders employ to attract top-tier […]

Right-Sized Solutions for NIST/CMMC Webinar on Demand

On Demand Webinar: Right-sized Solutions for NIST/CMMC Compliance

Posted Posted in Cybersecurity, High Rewards, Security, Strategy

EXP Technical recently hosted a FREE webinar entitled “Right-sized Solutions for NIST/CMMC Compliance.”
Among the items covered in the presentation were:

“High Value” Items in the NIST SP 800-171 Security Requirements and Journey to CMMC Level 3
Security Operations Center (SOC) as a Service
Pragmatic Approach to Security Information […]