How often do you get the chance to hear the unique perspective of an FBI Cybersecurity Investigations Agent, learn how to protect your business from cyber-attacks & enjoy an amazing lunch with local Atlanta businesses? Doesn’t happen too often.
Through the ATDC@ program, the incubator’s expertise and resources are available around the state, with representatives known as catalysts seeking out tech entrepreneurs.
Brings Best of NCR Restaurant Technology Under Aloha Brand
Comcast RISE to Award $1 Million in Grants to Small Businesses Owned by Women and People of Color in Atlanta
Blockchain | Business Process Management | Cloud | Corporate Development | CRM & CX | Data Governance | Data Science & Analytics | Digital Health | Diversity, Equity & Inclusion | Education/STEM | Fintech | Information Security | Infrastructure | International Business | Marketing | Media & Entertainment | Product Management | Sales Leadership | Smart Communities & Sustainablility | Workforce Development
Comcast announced it will award $1 million in grants to 100 small Atlanta area businesses owned by women and people of color, including Black, Indigenous, Hispanic, and Asian American owners, among others. The application process will open to qualifying businesses June 1-14, and prospective owners must have their businesses located in the City of Atlanta or in Fulton, Gwinnett, Clayton, Cobb or DeKalb counties.
AttackIQ Academy has a mission: to help cybersecurity teams respond to adversarial activity evolving, and becoming more targeted, sophisticated and automated.
DefenseStorm, a leading cloud-based provider of cyber security, fraud and compliance technology and managed services to banks, credit unions and fintechs, has been named a 2022 Pacesetter Award winner by the Atlanta Business Chronicle for the third consecutive year.
On average, bad actors can dwell unnoticed in an IT environment for 45 days, prior to the execution of an attack. Couple that with the majority of attacks that exploit legitimate access by taking advantage of existing vulnerabilities and through social engineering. How do you prevent hackers from running rampant once they’ve compromised your network systems and handle the expense of remediation?
Cybersecurity best practices are the baseline for preventing an attack, but they won’t protect your business from everything. Hackers are targeting businesses in this country every 39 seconds. How do you know if you have active cyber threats swimming around in your environment right now? And, how do you keep those threats from becoming full-blown attacks? More importantly, are you well-positioned to respond to the attack? More is needed to effectively defend your business.
AMI, a global leader in the Dynamic Firmware market for worldwide computing, today announced Samuel John Cure as its Chief Information Security Officer (CISO). Cure previously served as CISO of Planview, Inc., and AXIS Capital. Along with his two successful tenures as CISO, he brings a spirit of innovation and expertise in building international cybersecurity programs to the AMI team. In addition, Cure has extensive experience crafting business-aligned cybersecurity programs, providing executive oversight of risk management, including identifying and mitigating security risks in all corporate functions and external-facing products and solutions.
Comcast Business Recognized as Technology Champion for Good and for its Efforts to Increase Digital Equity in Georgia
Comcast Receives Tech for Good Award for Lift Zones; Rachel Ozias, Vice President of Xfinity Consumer Services, Named Emerging Leader of the Year
Technology Executives Roundtable Meeting – Why & How to Grow Your Tech Business Internationally – in the New European World
Moderator JC Boyanton, Senior Vice President, Truist, will moderate a panel of experts at the next Technology Executives Roundtable event, as they discuss how to grow a technology business in Europe and globally.
Blockchain | Business Process Management | Corporate Development | CRM & CX | Data Governance | Fintech | Information Security | Infrastructure | Marketing | Smart Communities & Sustainablility | Workforce Development
VanderHaar to oversee the firm’s strategic vision and purpose to enable every communications professional to realize their potential
DefenseStorm Named a Winner of the Atlanta Journal-Constitution’s Metro Atlanta Top Workplaces of 2022 Award
DefenseStorm, a leading cloud-based cybersecurity, cyberfraud and cybercompliance management provider to regional and community banks and credit unions, has been named a Top Workplace 2022 by the Atlanta Journal-Constitution.
Business Process Management | Cloud | Data Governance | Data Science & Analytics | Georgia Defense Industrial Base Taskforce | Information Security | Infrastructure | Southeastern Software Association
Training Exercises: The war in Ukraine has become a live testing ground for the next generation of cyber weapons as an unprecedented layer to conventional warfare.
Blockchain | Business Process Management | Cloud | Corporate Development | CRM & CX | Data Governance | Data Science & Analytics | Digital Health | Diversity, Equity & Inclusion | Education/STEM | Fintech | Information Security | Infrastructure | International Business | Marketing | Media & Entertainment | Product Management | Sales Leadership | Smart Communities & Sustainablility | Southeastern Software Association | Supply Chain, Logistics & Manufacturing | Transportation Tech | Women In Technology | Workforce Development | Young Professionals
Are you looking for a new type of startup program that centers on women empowering women?
SkillsUSA Georgia Postsecondary held its annual competition on February 24-26, 2022 at the Georgia World Congress Center. The first in-person conference since 2019, students from across the state competed in a variety of competition areas to showcase their skills. Business and industry partners served as judges who selected the best in each contest and provided industry related prizes to the top winners. The gold medal winners will advance to the national competition in June 2022.
Organizations can now integrate their Drata account with Curricula to automate security awareness training evidence requirements for SOC 2 and other compliance frameworks.
Blockchain | Business Process Management | Cloud | Corporate Development | CRM & CX | Data Governance | Data Science & Analytics | Digital Health | Education/STEM | Fintech | Information Security | Smart Communities & Sustainablility | Southeastern Software Association
Join Cherry Bekaert CPAs and Advisors on April 12th as we demystify revenue recognition for technology companies – including from the investor’s perspective. Though it’s been in effect for a few years, ASC 606 still carries some ambiguity. Cherry Bekaert’s advisors are here to help break down the reporting differences as well as provide recommendations related to the changes.
SureLock Technology continues to expand its leadership team with the addition of Jeff Daniel, Director of Engineering
|LAWRENCEVILLE, GA – March 1st, 2022 – Bob Kopesky, President & CEO SureLock Technology is pleased to appoint Jeff Daniel to the position of Director of Engineering. Daniel will be tasked with managing the Engineering team and overseeing all professional services.|
TEMPE, Ariz., February 21, 2022 – Snap Tech IT, a managed services & cybersecurity provider, today announced that it has completed its SOC 2 Type II audit, performed by KirkpatrickPrice. This attestation provides evidence that Snap Tech IT has a strong commitment to security and to delivering high-quality services to its clients by demonstrating that they have the necessary internal controls and processes in place.
Fulton County Arts & Culture launches the Public Art Futures Lab, a physical and online space exploring the intersection of art and technology. Through public-private partnerships, the Lab seeks to democratize access to the creation and participation of art through technology. While there are existing private innovation labs offered by universities, technology companies and museums, the Lab is the first Government-led space of its kind in the United States.
In a recent Legal Technology Survey, 34% of legal firms indicated that they do not have an incident response plan, putting them at tremendous risk of upholding regulations around information security & data privacy. These firms are exposing themselves to downtime, leading to loss of revenue through unprocessed billable hours, reputational damage, & additional financial losses in an attempt to recover stolen data.
Georgia State University’s J. Mack Robinson College of Business will introduce a Master of Science in Supply Chain Management in fall 2022. The one-year, three-semester program emphasizes the role of coordination and synchronization in creating efficiencies and value across all components of the end-to-end supply chain.
Businesses undergoing a SOC 2 audit can now access free SOC 2 security awareness training content and educational materials for their employees
Inc. 5000 Fastest-Growing Fourth Consecutive Year and a Top 100 Company
Appian (NASDAQ: APPN) today announced the general availability of Appian Process Mining, the easiest way to identify and address workflow bottlenecks. Now organizations can discover process inefficiencies, and then design and automate those workflows in a unified platform. With the addition of native process mining, Appian delivers the world’s most complete low-code platform.
Business Process Management | Cloud | Corporate Development | CRM & CX | Data Governance | Data Science & Analytics | Digital Health | Education/STEM | Fintech | Information Security | Infrastructure | Sales Leadership | Southeastern Software Association | Young Professionals
We are entering a new realm of cyber-attacks, placing financial organizations directly in the crosshairs. In 2021, a number of major financial organizations were hit with devastating attacks, including Automatic Funds Transfer Services, Flagstar Bank, CNA Financial & more. Larger companies with more resources are being affected by cyber-attacks than ever before. Where does that leave smaller financial businesses in protecting sensitive data without stout resources or infrastructure in place? And, how does a smaller financial firm strike a balance between achieving financial compliance with regulators & properly structuring cybersecurity for their organization that protects critical data simultaneously? Cybercriminals understand that expertise & resources pose a difficult challenge for smaller financial organizations & are willing to target them as low-hanging fruit. Less work on their end.
Business Process Management | Cloud | Data Governance | Data Science & Analytics | Fintech | Georgia Defense Industrial Base Taskforce | Information Security | Infrastructure | Southeastern Software Association
When you peel back the layers on CMMC Password Policies you’ll find that there’s quite a bit of ambiguity when it comes to CMMC password policies under 2.0. In this segment, Snap Tech IT COO, Shawn Brown, brings clarity to the gray area using NIST guidelines for creating & managing passwords and associated policies. You’ll learn practical approaches to scaling password management across your business, what to consider when implementing password policies & best ways to prepare for your auditor that will evaluate these policies for certification. Check out the latest episode! https://www.snaptechit.com/educational-assets/peeling-back-the-layers-on-cmmc-password-policies/