Your intellectual property, business data, and personal information are more valuable now than ever…both to you and to cybercriminals.
Think your business is too small to be at risk? Think again! It is critical that you learn how to protect yourself, your business, and your customers.
In this FREE workshop, discover how to minimize your cybersecurity risks from a technical perspective, under state and federal data privacy laws, as well as how to transfer your risk using insurance.
In this seminar, you will learn:
Don’t miss this valuable workshop – your business and customers are counting on you!
Ari Santiago, IT Direct
Ari Santiago is the President of IT Direct, an award-winning IT solutions provider that helps small to midsize organizations realize a competitive advantage by harnessing the power of technology to reach their business goals. As both an IT expert and business leader, Ari has a unique perspective on how technology helps businesses to grow and succeed as well as the importance of prioritizing cybersecurity. Ari is an energetic and respected speaker and has spoken about cybersecurity to small and midsized businesses throughout Connecticut.
Matthew Hunt, Smith Brothers Insurance
Matt Hunt has been a Commercial Lines Advisor at Smith Brothers since 2003. Matt’s focus is protecting his client’s balance sheet from unexpected loss by providing proven risk management methods. “My job is to be my client’s risk manager, an extension of their management team. With the hundreds of worries a business owner has every day, I am able to take the risk management and insurance worry off their plate; freeing them to work on other parts of their business."
Sherwin Yoder, Carmody Torrance Sandak & Hennessey LLP
As a certified privacy professional (CIPP/US), Sherwin focuses on helping organizations mitigate data privacy and security risks and manage incident response, including related litigation. He also counsels start-ups and emerging companies on their privacy and security obligations in designing and launching e-commerce sites, mobile applications, IoT devices, and other technologies or transactions involving the flow of data.