• HOME
  • SERVICES
    • CYBER SECURITY
    • RISK MANAGEMENT
    • DATA PRIVACY
    • PROCESS IMPROVEMENT
    • CHANGE MANAGEMENT
    • TRAINING
  • ABOUT
    • ADVANTAGES
    • METHODOLOGIES
    • A + RESULTS
    • CLIENTS
    • SPEAKING/WRITING
    • MISSION-VISION-VALUES
    • TEAM
    • PRESS RELEASES
  • CONTACT
  • BLOG
  • PODCAST

Abstract Forward & LegacyArmour Lead @ Club Entrepreneur Executive Meeting 11/01/18 To Help SMB Cybersecurity

7 years ago
abstractfwd1987
No Comments

The Twin Cities have continued to become a hot spot for tech entrepreneurs seeking to solve complex problems as Start-Up Week Twin Cities recently reaffirmed. Two such companies with unique cyber-security tech approaches, Abstract Forward Consulting and LegacyArmour.com, will address how SMB business owners of all types can measure and mitigate growing cyber risk to beat the competition. Independent CISO/CIO consultant Doug Hahn will round out the two fiery founders. Club leader and financier Rick Brimacomb will moderate.

Register for the Thurs 11/01/18 11:15 a.m. luncheon at the Minneapolis Club here.

See the bios of these three-panel members below:

1) Jeremy Swenson has worked or consulted at 10 organizations in 7 industries on progressively complex and difficult problems in business technology including: proj. mgmt., business analysis, data archival and governance, audit, web application launch and decommission, strategy, information security, data loss prevention, and board governance. Overall his work can be tied to nearly a billion dollars of savings. He is the founder of Abstract Forward Consulting, a cybersecurity, process improvement, and change management consultancy. He has an MBA from Saint Mary’s University of MN and an (MSST) Master’s degree in security technologies from the University of Minnesota.

2) Doug Hahn CISSP, is an IT executive with a demonstrated history of working in information technology departments in a variety of industries. He is skilled in IT management, business process, requirements analysis, enterprise architecture, requirements gathering, IT security and agile methodologies. He was the CISO and CTO of Healthtel, now Revel. Prior to that, he was SVP of Enterprise Architecture at Ceridian. He is also a Certified Information Systems Security Professional. He is a strong entrepreneurial professional who has advised many small businesses on cybersecurity. He has a BS focused in Mathematics from University of Wisconsin.

3) Sahar Ismail has a degree in Electrical Engineering and a Masters in Security Technologies (MSST) from the University of Minnesota. She has strong experience in leadership, Healthcare, Education, Finance, Service Oriented Architecture, Project Management, and International Commerce. She has been the leader of a multinational team, a team lead for a nationwide cloud solution, and a Manager of Enterprise Architecture for one of the largest online education providers. She has 20 years of hands-on IT experience, is business savvy, multi-lingual, and is the driving force behind the creation of Legacyarmour.com as CEO and Co-Founder. LegacyArmour is an award-winning legacy planning platform powered by an Artificial Intelligence engine where you organize your important assets in encrypted vaults to have it automatically delivered to designated recipients based on date, death or incapacitation.

If your not interested yet, here are eight reasons why small to medium business are increasingly targeted for cyber attacks which could put them out of business fast – we aim to solve for these issues:

1) They have no or small IT dept.

2) They are less likely to follow internet security best practices.

3) They have simple networks and systems – often default configurations.

4) They use the cloud often.

5) Use third party software with little dependency knowledge.

6) They have big data most of which is not encrypted.

7) They are heads down in their business.

8) They have no incident response plan / tabletop exercises done.

Register for the Thurs 11/01/18 11:15 a.m. luncheon at the Minneapolis Club here.

Previous Post
U.S. Healthcare Orgs and the GDPR: A New Wave of Privacy Is Blowing In From Europe
Next Post
Top 12 Ways Small To Med Businesses Can Reduce Cyber Risk

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

The reCAPTCHA verification period has expired. Please reload the page.

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.
X
LinkedIn

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.

Recent Comments

  • Abstract Forward Partners with Ignyte on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Abstract Forward Partners with Ignyte | Ignyte Assurance Platform on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Social Tech CEO Jimmy Chamberlin Rejoins Smashing Pumpkins
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Prince and Purple Rain 30 years later: Business and Music Innovation
  • brianfpennington on Demystifying 9 Common Types of Cyber Risk

Archives

  • November 2023
  • January 2023
  • June 2022
  • April 2022
  • January 2022
  • June 2021
  • December 2020
  • August 2020
  • March 2020
  • January 2020
  • August 2019
  • March 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • December 2017
  • November 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • July 2016
  • May 2016
  • March 2016
  • February 2016
  • August 2015
  • June 2015
  • February 2015
  • January 2015
  • December 2014
  • August 2014
  • May 2014
  • April 2014

Categories

  • 2016 election hack
  • 2016 tech review
  • 360 net lab
  • 80s music
  • Alternative music
  • Amazon
  • Android
  • apple
  • arlines hack
  • artificial intelligence
  • Billy Corgan
  • Bitcoin security
  • british airways breach
  • Business
  • business analysis
  • business continuity
  • Chinese hackers
  • cloud computing
  • CoinHive
  • Coronavirus malware
  • COVID-19 scams
  • crypto mixing
  • Crypto Money Laundering
  • crypto-jacking
  • currency
  • cyber insurance
  • Cyber Security
  • cyber security framework
  • Cyber-Espionage
  • Cybersecuity summit
  • data back up
  • data breach
  • Data Exfiltration Detection
  • data security
  • Denial of Service (DoS) Attacks
  • Direct x12
  • disinformation
  • drones
  • election security
  • equifax breach
  • esports security
  • EU Privacy
  • FDIC
  • federal reserve
  • GDPR
  • gdpr test british airways breach
  • google glass
  • Google Mandiant
  • grc
  • GroupOn
  • iam
  • Ignyte Assurance Platform
  • iphone
  • Jimmy Chamberlin
  • leadership vs. management
  • LinkedIn
  • Live Streaming
  • LiveOne
  • Lumia Phone
  • management consulting
  • Microsoft
  • microsoft azure
  • Microsoft Continuum
  • MikroTik Routers
  • MN Start-Up
  • mobile os
  • mobile web
  • NASA
  • navy cyber hack
  • net neutrality
  • network intrusion
  • OpenStack
  • PBS Frontline
  • personal aircraft
  • phone market share
  • Prince: R U Listening
  • project management
  • Project Sparta
  • Purple Rain
  • Rackspace
  • ransomware
  • ransomware removal
  • retail
  • risk management
  • Salesforce
  • self driving cars
  • small business
  • small business cyber security
  • Smashing Pumpkins
  • SME Infosec
  • Social Media
  • socrates
  • sony pictures
  • stalkerware
  • Stuxnet
  • target
  • Tech Year In Review
  • third party risk management
  • Unit 61398
  • vendor risk mgmt
  • video surveillance
  • Web App Attack
  • WEP vs WPA2
  • Windows 10

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

All rights reserved © 2018 to present. Abstract Forward Consulting, LLC. Privacy Policy | Terms of Service | Web Accessibility | Sitemap.