...

Events

[vc_row][vc_column][mk_icon_box icon=”mk-moon-play” title=”Cybersecurity for Corporate Finance” text_size=”22″ font_weight=”500″ read_more_txt=”Watch Now” read_more_url=”https://www.prescientsolutions.com/events/cybersecurity-for-corporate-finance/” style=”boxed” icon_color=”#ffffff” icon_circle_color=”#606060″ icon_circle_border_color=”#606060″]View this on-demand webcast to learn about the top Cybersecurity threats that corporate finance needs to understand, and what steps and processes can be implemented to protect and recover from Cybersecurity breaches.[/mk_icon_box][mk_icon_box icon=”mk-moon-play” title=”The Cost of Downtime” text_size=”22″ font_weight=”500″ read_more_txt=”Watch Now” read_more_url=”https://www.prescientsolutions.com/events/the-cost-of-downtime/” style=”boxed” icon_color=”#ffffff” icon_circle_color=”#606060″ icon_circle_border_color=”#606060″]View this on-demand webcast to discover the causes of downtime and things to consider, how to determine your threshold, and which solution is right for your business.[/mk_icon_box][mk_icon_box icon=”mk-moon-play” title=”Top Cyber Security Considerations for Small Business” text_size=”22″ font_weight=”500″ read_more_txt=”Watch Now” read_more_url=”http://www.prescientsolutions.com/events/top-cyber-security-considerations-small-business/” style=”boxed” icon_color=”#ffffff” icon_circle_color=”#606060″ icon_circle_border_color=”#606060″]View this on-demand webcast to learn the top cyber security threats that face small business, and what steps and processes can be implemented to protect and recover from cyber security threats.[/mk_icon_box][/vc_column][/vc_row][vc_row][vc_column][mk_icon_box icon=”mk-moon-play” title=”Top Cybersecurity Threats & How to Protect Your Organization” text_size=”22″ font_weight=”500″ read_more_txt=”Watch Now” read_more_url=”http://www.prescientsolutions.com/events/top-cybersecurity-threats-protect-organization/” style=”boxed” icon_color=”#ffffff” icon_circle_color=”#606060″ icon_circle_border_color=”#606060″]This on-demand webcast features Jerry Irvine, National Cyber Security Task Force member, and Chief Information Officer at Prescient Solutions. As a certified ethical hacker, Jerry will discuss real life examples of cyber risks along with strategies your company can deploy to effectively defend your environment from these threats.[/mk_icon_box][/vc_column][/vc_row]

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.