Losing your phone is no longer just an inconvenience.
For many of us, a cell phone has become an indispensable tool in our daily life. We use it to communicate with others, to take pictures, and to keep track
Yahoo Data Breach - What Happened, What To Do Next and How To Protect Yourself
Yahoo reported last Thursday at least 500 million user accounts were affected by a massive data breach. The hack happened in 2014, when hackers stole account
IT Security Tip Sheet: Using a Wireless Keyboard? What You Should Know
In my role as IT Audit Security Manager, I drafted this brief review of a new cybersecurity threat involving the use of wireless keyboards. Many businesses
Chief Information Security Officer (CISO), or the equivalent function, has become a standard in business, government and the non-profit sector throughout
This site uses cookies to ensure that we give you the best user experience. Cookies assist in navigation, analyzing traffic and in our marketing efforts as described in our Privacy Policy.
Our goal is to provide compelling and relevant content that is specific to the business matters most important to you and your organization. Feel free to sign up for one or all of the sessions via the link below. Once registered, you will receive an individual login link for each session.
Tuesday, December 5, 2023 | 9:00 AM | Tax Update (3 CPE Hours)
Thursday, December 7, 2023 | 1:00 PM | Consulting, Technology and Advisory
(3 CPE Hours)
Tuesday, December 12, 2023 | 9:00 AM | Audit Update (2.5 CPE Hours)
Thursday, December 14, 2023 | 1:00 PM | Wealth Management and Retirement Planning Matters (3 CPE Hours)