Cybersecurity Training: Securing Your Data and Your Networks

Map Unavailable

Date(s) - 08/10/2017
10:00 am - 12:00 pm

Mason Enterprise Center



Tickets: $0.00

The recent series of global ransomware attacks have reminded all corporate leaders of the growing importance of protecting your IP, your data and your network. Preventing your IP and critical data from theft, damage, or ransom helps you maintain your bottom line. When your systems are compromised, the longer you wait to identify your important data and all your network’s access points where a hacker could have entered, the more it will cost you. The costs are your wasted time, your unsupported clients and your unrealized revenue. It costs more to remediate a hacked system then it does to prevent the hack in the first place.


In this workshop – presented for the non-technical business leader – you will learn how to identify the important information to protect and how to protect it. You will understand how pivotal your employees can be to prevent an attack and how to make them your strongest link. We will help you understand the key components needed to defend your high value data and information systems from cyber-attacks and insider threats. We will help you select and implement methods and techniques to prevent your assets from compromise.

When the workshop is complete, you will understand your data priorities and how you can secure your data and the systems that are used to access and store that information.


John Harrison works with Federal Agencies to maintain continuity of operations and works with small firms to Fortune 500 companies to help them stay in business. He uses his military and intelligence experiences to truly understand your “adversary.” He provides cybersecurity services to protect profits, customers, and data. He has advised organizations like the National Security Agency, Defense Intelligence Agency, Directorate of National Intelligence, and Department of State on some of our greatest national security issues. John speaks on cybersecurity topics such as “Protect Yourself from Insider Threats,” “We’ve Been %$&# Hacked! Now What!?” and “From the Stone Age to Today…What Can History Teach Us About Cybersecurity?

John has a BA in criminal law, an MBA from Georgetown, and a robust cybersecurity education from his days within the Intelligence Community. John is a Certified Ethical HackerCertified Incident HandlerCertified Insider Threat Investigative Analyst, and holds various advanced analytical certificates.

Workshop Co-Sponsored by DAR Partners


Register Now