Join cybersecurity experts Dr. Larry Ponemon of the Ponemon Institute and Kyle Watson, VP of Identity and Access Management at Converge Technology Solutions, for a deep dive into the state of cybersecurity preparedness. In today’s rapidly evolving threat landscape,...
cybersecurity
HIPAA Security Rule Update: How Healthcare Organizations Can Prepare for Cybersecurity Changes
January 2025 is ushering in a significant development in healthcare cybersecurity. With the Office for Civil Rights (OCR) at the Department of Health and Human Services (HHS) proposing modifications to the HIPAA Security Rule, the healthcare sector faces its most...
Copilot for M365 – Security + Compliance | Dine & Dash Series
Join us for Session #3 in our 6-part series! This 30-minute virtual session will dive into Security + Compliance around Copilot for Microsoft 365 (M365), featuring our guest expert, Sean Colicchio Global CISO for Security operations at Converge. In this session, we...
Building Data Resiliency to Combat Ransomware Threats
Constant threats put IT estates at risk, demanding proactive protection. From natural disasters, outages, credential breaches, to cyberattacks—every scenario requires careful planning. Among these threats, ransomware presents unique challenges for IT departments....
How to Protect Your Business from Holiday Cyber Attacks: The Breachiest Time of the Year
As the holidays approach, companies are gearing up for the busiest time of the year. For retailers, it’s peak shopping season. For businesses, it’s the time to close out Q4 and prep for a strong start in January. But while the rest of the world is focused on holiday...
Sumo Logic X Converge Threat Hunting Workshop and Tecovas Boot Fitting
Give the Sumo Logic platform a test drive. During this technical session, we put the simplicity and power of Sumo Logic and Converge directly in your hands while you test out the technology with local experts. Happy Hour will follow after the workshop at Tecovas boot...
Strengthen Your Cybersecurity Posture Through Purple Team Engagements
As cyber threats continue to evolve, threat actors use increasingly more sophisticated tools, tactics, and techniques. Traditional offensive security services, such as penetration testing, are not enough to help organizations identify security gaps. Effective...
Maximizing Your Security Investments
Organizations have spent billions in various cybersecurity controls and countermeasures, yet many fail to maximize the potential of these investments to drive the ROI we should demand. One key area where organizations can realize significant value is within the...