Cyber Security Risk Assessments: FAQ
What is a cyber security risk assessment? Do we need to conduct one? Find the answers to those frequently asked questions in this article!
Josh loves security. He loves it so much he made it his livelihood. And he decided to do this during a global pandemic.
After graduating from Duquesne University with a degree in Logistics, Materials and Supply Chain Management, Josh completed his graduate studies at Duquesne in 2016 with a master’s degree in Information Systems Management. All while consulting as a business analytics specialist at The Hillman Company during the week and performing each weekend with The Tamburitzans (FKA The Duquesne University Tamburitzans). Look it up, you can watch him dance if you want.
Josh was hired full time as a Business Analyst for The Hillman Company in 2016 where he helped manage IT functions, security, and the firm’s transformation into a data driven organization through the implementation of data visualization technologies.
In 2018 he left The Hillman Company looking for a new challenge, joining FinancialPeople Staffing to manage and develop their Pittsburgh office. Getting a taste for successful business development and entrepreneurship, he decided it was time in July 2020 to start a company of his own.
LastLine Cyber Inc., encompasses Josh’s creative and entrepreneurial spirit with his passion for cyber security.
Writing and playing music with his family, smoking ribs, and fishing on the river is where you’ll find Josh when he’s not helping businesses create secure cultures. His wife Christine, his son Thomas, and their pup Leia mean the world to him, and none of this would be possible without the support of his incredible family.
What is a cyber security risk assessment? Do we need to conduct one? Find the answers to those frequently asked questions in this article!
Penetration testing (pen testing) simulates what might happen if a cyber attacker targets your organization. Learn more on this blog!
IT Governance is a leading provider of information security solutions. Lean more about what this new partnership means for LastLine Cyber.
Password requirements and policies are a contention point in many organizations. Read about how to avoid unsecure password practices.
Advanced Persistent Threats (APTs) and Threat Actors target U.S. Government Entities and large corporations. Learn more about APTs here!
Smishing is a form of Social Engineering, targeting victims through convincing text messages designed to trick you. Learn more about it here!
What is a cyber security risk assessment? Do we need to conduct one? Find the answers to those frequently asked questions in this article!
Penetration testing (pen testing) simulates what might happen if a cyber attacker targets your organization. Learn more on this blog!
IT Governance is a leading provider of information security solutions. Lean more about what this new partnership means for LastLine Cyber.
Password requirements and policies are a contention point in many organizations. Read about how to avoid unsecure password practices.
Advanced Persistent Threats (APTs) and Threat Actors target U.S. Government Entities and large corporations. Learn more about APTs here!
Smishing is a form of Social Engineering, targeting victims through convincing text messages designed to trick you. Learn more about it here!