Georgia State Hosts Executive Education Summit on Generative A.I.

Business Process Management | Education/STEM

Georgia State University’s J. Mack Robinson College of Business hosted “Generative A.I. – Unlocking Business Value” – an immersive executive education session.

Read More

Snap Tech IT Webinar Series: Microsoft Teams: Top Security Tips to Boost Productivity

Business Process Management | Cloud | Data Governance | Data Science & Analytics | Digital Health | Fintech | Information Security | Sales Leadership | Southeastern Software Association

Remote working and COVID-19 have vastly accelerated the use of Microsoft Teams over the last two years; a real game-changer for remote teams. MS Teams does have a number of security vulnerabilities that businesses need to understand and address.

Read More

CyberDefense Educational Series: Digital Transformation: Securing Remote Work Environments in Legal Firms

Business Process Management | Cloud | Data Governance | Digital Health | Information Security | Infrastructure | Sales Leadership

A recent Legal Trends Report shows 79% of potential clients perceive the option to work remotely with a lawyer as a significant factor that would positively influence their decision to hire that lawyer.

Read More

Snap Tech IT Expert Forum: Navigating Cyber Insurance with FifthWall Solutions & techrug

Business Process Management | Cloud | Data Governance | Fintech | Georgia Defense Industrial Base Taskforce | Information Security | Infrastructure | Sales Leadership

With the sheer frequency of cyber-attacks on businesses over the last two years, cyber insurance is quickly becoming a necessity to ensure losses are covered in the event of a malicious cyber-attack. Demand for this type of protection has increased faster than most can get their heads around, leaving us with crucial questions as to how cyber insurance works and just how well our businesses are being protected.

Read More

CMMC Updates: Pushing Forward to May 2023 Interim Rule

Business Process Management | Cloud | Data Governance | Data Science & Analytics | Digital Health | Georgia Defense Industrial Base Taskforce | Information Security | Infrastructure

Sweeping changes have taken place with the leadership infrastructure related to CMMC. Now, DoD CIO is leading the charge & this realignment is chartered with consolidating industry-related cybersecurity programs in an effort to maximize collaboration across the Defense Industrial Base Cybersecurity programs. DoD CIO is pushing forward, requesting an interim rule by May 2023. What does all this mean for DoD subcontractors preparing for certification?

Read More

The Home Depot Supports Supply Chain and Logistics Vertical with Georgia Tech’s Advanced Technology Development Center

Business Process Management | Product Management | Supply Chain, Logistics & Manufacturing

Companies participating in the incubator program will work directly with SC&L and business leaders at The Home Depot and Georgia Tech as they build.

Read More

Save the Date! FBI Cybersecurity Briefing for Atlanta Businesses at The Capital Grille – Hosted by Snap Tech IT

Business Process Management | Cloud | Data Governance | Fintech | Georgia Defense Industrial Base Taskforce | Information Security

Amazing opportunity for Atlanta area businesses! It’s your chance to hear the unique perspective of an FBI Cybersecurity Investigations Agent, learn how to protect your business from cyber-attacks & enjoy an amazing lunch on us with local colleagues!

Read More

Snap Tech IT Hosting FBI Cybersecurity Briefing at The Capital Grille

Business Process Management | Cloud | Data Governance | Digital Health | Fintech | Georgia Defense Industrial Base Taskforce | Information Security | Infrastructure | Media & Entertainment

How often do you get the chance to hear the unique perspective of an FBI Cybersecurity Investigations Agent, learn how to protect your business from cyber-attacks & enjoy an amazing lunch with local Atlanta businesses? Doesn’t happen too often.

Read More

Comcast RISE to Award $1 Million in Grants to Small Businesses Owned by Women and People of Color in Atlanta

Blockchain | Business Process Management | Cloud | Corporate Development | CRM & CX | Data Governance | Data Science & Analytics | Digital Health | Diversity, Equity & Inclusion | Education/STEM | Fintech | Information Security | Infrastructure | International Business | Marketing | Media & Entertainment | Product Management | Sales Leadership | Smart Communities & Sustainablility | Workforce Development

Comcast announced it will award $1 million in grants to 100 small Atlanta area businesses owned by women and people of color, including Black, Indigenous, Hispanic, and Asian American owners, among others. The application process will open to qualifying businesses June 1-14, and prospective owners must have their businesses located in the City of Atlanta or in Fulton, Gwinnett, Clayton, Cobb or DeKalb counties.

Read More

Client Spotlight Webinar: Zero Trust Cybersecurity Defense with Application Control

Business Process Management | Cloud | Data Governance | Data Science & Analytics | Fintech | Information Security | Infrastructure

On average, bad actors can dwell unnoticed in an IT environment for 45 days, prior to the execution of an attack. Couple that with the majority of attacks that exploit legitimate access by taking advantage of existing vulnerabilities and through social engineering. How do you prevent hackers from running rampant once they’ve compromised your network systems and handle the expense of remediation?

Read More

Webinar: Real-World Cybersecurity: Winning with Process-Driven Managed Detection & Response

Business Process Management | Cloud | Data Governance | Data Science & Analytics | Digital Health | Fintech | Information Security | Infrastructure

Cybersecurity best practices are the baseline for preventing an attack, but they won’t protect your business from everything. Hackers are targeting businesses in this country every 39 seconds. How do you know if you have active cyber threats swimming around in your environment right now? And, how do you keep those threats from becoming full-blown attacks? More importantly, are you well-positioned to respond to the attack? More is needed to effectively defend your business.

Read More

Technology Executives Roundtable Meeting – Why & How to Grow Your Tech Business Internationally – in the New European World

Business Process Management | Corporate Development | Data Governance | Information Security | International Business

Moderator JC Boyanton, Senior Vice President, Truist, will moderate a panel of experts at the next Technology Executives Roundtable event, as they discuss how to grow a technology business in Europe and globally.

Read More

Russian Cyber-Attacks on the Defense Industrial Base: What’s at Stake?

Business Process Management | Cloud | Data Governance | Data Science & Analytics | Georgia Defense Industrial Base Taskforce | Information Security | Infrastructure | Southeastern Software Association

Training Exercises: The war in Ukraine has become a live testing ground for the next generation of cyber weapons as an unprecedented layer to conventional warfare.

Read More

Curricula Partners with Drata to Automate Security Awareness Training Compliance

Business Process Management | Fintech | Information Security

Organizations can now integrate their Drata account with Curricula to automate security awareness training evidence requirements for SOC 2 and other compliance frameworks.

Read More

Webinar: Demystifying Revenue Recognition for Tech Companies and Their Investors

Blockchain | Business Process Management | Cloud | Corporate Development | CRM & CX | Data Governance | Data Science & Analytics | Digital Health | Education/STEM | Fintech | Information Security | Smart Communities & Sustainablility | Southeastern Software Association

Join Cherry Bekaert CPAs and Advisors on April 12th as we demystify revenue recognition for technology companies – including from the investor’s perspective. Though it’s been in effect for a few years, ASC 606 still carries some ambiguity. Cherry Bekaert’s advisors are here to help break down the reporting differences as well as provide recommendations related to the changes.

Read More

Snap Tech IT Receives SOC 2 Type II Attestation from KirkPatrickPrice

Business Process Management | Cloud | Data Governance | Data Science & Analytics | Digital Health | Fintech | Information Security | Infrastructure | Southeastern Software Association

TEMPE, Ariz., February 21, 2022 – Snap Tech IT, a managed services & cybersecurity provider, today announced that it has completed its SOC 2 Type II audit, performed by KirkpatrickPrice. This attestation provides evidence that Snap Tech IT has a strong commitment to security and to delivering high-quality services to its clients by demonstrating that they have the necessary internal controls and processes in place.

Read More

Legal Firm Webinar: Strengthening Data Security & Compliance

Business Process Management | Cloud | Data Governance | Digital Health | Information Security

In a recent Legal Technology Survey, 34% of legal firms indicated that they do not have an incident response plan, putting them at tremendous risk of upholding regulations around information security & data privacy. These firms are exposing themselves to downtime, leading to loss of revenue through unprocessed billable hours, reputational damage, & additional financial losses in an attempt to recover stolen data.

Read More

Georgia State to Offer Master’s in Supply Chain Management

Business Process Management | Workforce Development

Georgia State University’s J. Mack Robinson College of Business will introduce a Master of Science in Supply Chain Management in fall 2022. The one-year, three-semester program emphasizes the role of coordination and synchronization in creating efficiencies and value across all components of the end-to-end supply chain.

Read More

Appian Process Mining Now Available

Business Process Management | Data Science & Analytics

Appian (NASDAQ: APPN) today announced the general availability of Appian Process Mining, the easiest way to identify and address workflow bottlenecks. Now organizations can discover process inefficiencies, and then design and automate those workflows in a unified platform. With the addition of native process mining, Appian delivers the world’s most complete low-code platform.

Read More

Financial CyberDefense Webinar: Striking a Balance Between Compliance & CyberSecurity

Business Process Management | Cloud | Corporate Development | CRM & CX | Data Governance | Data Science & Analytics | Digital Health | Education/STEM | Fintech | Information Security | Infrastructure | Sales Leadership | Southeastern Software Association | Young Professionals

We are entering a new realm of cyber-attacks, placing financial organizations directly in the crosshairs. In 2021, a number of major financial organizations were hit with devastating attacks, including Automatic Funds Transfer Services, Flagstar Bank, CNA Financial & more. Larger companies with more resources are being affected by cyber-attacks than ever before. Where does that leave smaller financial businesses in protecting sensitive data without stout resources or infrastructure in place? And, how does a smaller financial firm strike a balance between achieving financial compliance with regulators & properly structuring cybersecurity for their organization that protects critical data simultaneously? Cybercriminals understand that expertise & resources pose a difficult challenge for smaller financial organizations & are willing to target them as low-hanging fruit. Less work on their end.

Read More

CMMC Quick Bytes: Peeling Back the Layers on CMMC Password Policies

Business Process Management | Cloud | Data Governance | Data Science & Analytics | Fintech | Georgia Defense Industrial Base Taskforce | Information Security | Infrastructure | Southeastern Software Association

When you peel back the layers on CMMC Password Policies you’ll find that there’s quite a bit of ambiguity when it comes to CMMC password policies under 2.0. In this segment, Snap Tech IT COO, Shawn Brown, brings clarity to the gray area using NIST guidelines for creating & managing passwords and associated policies. You’ll learn practical approaches to scaling password management across your business, what to consider when implementing password policies & best ways to prepare for your auditor that will evaluate these policies for certification. Check out the latest episode! https://www.snaptechit.com/educational-assets/peeling-back-the-layers-on-cmmc-password-policies/

Read More

Webinar: CMMC 2.0: Level 2 CUI Breakdown

Business Process Management | Cloud | Data Governance | Data Science & Analytics | Fintech | Information Security | Transportation Tech

Many DoD subcontractors will be required to meet Level 2 compliance under CMMC 2.0 moving forward. While the tiered structure has alleviated some of the challenges associated with 1.0, it’s important to understand the changes to each level and what requirements are still in place, particularly when it comes to CUI.

Read More

CMMC 2.0 Webinar: Level 1 Self-Assessment

Business Process Management | Cloud | Data Governance | Information Security | Infrastructure | Transportation Tech

CMMC 2.0 brings big changes & sighs of relief to many Defense Industrial Base contractors with the ability to conduct self-assessments for Level 1 and a subset of Level 2. While this relieves a heavy burden in many aspects, there’s a flipside to these changes to bear in mind as you continue down the path to certification.

Read More

CMMC Quick Bytes Series: Why Identifying Scope is Critical to Securing Certification

Business Process Management | Cloud | Data Governance | Digital Health | Fintech | Information Security | Infrastructure | Southeastern Software Association

CMMC Quick Bytes Series: Identifying Scope, Common CMMC Terms & More — In this interview, Karl will dive into Identifying Scope and what that means for DoD subcontractors seeking certification. Learn common CMMC terms used in the certification process, what scoping is in relation to CMMC, how you identify where your sensitive data lives, ways to identify scope to an assessor and more. https://www.snaptechit.com/educational-assets/cmmc-quick-bytes-process-overview-best-practices-2/

Read More

var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-30140-8']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })(); !function(f,b,e,v,n,t,s) {if(f.fbq)return;n=f.fbq=function(){n.callMethod? n.callMethod.apply(n,arguments):n.queue.push(arguments)}; if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0'; n.queue=[];t=b.createElement(e);t.async=!0; t.src=v;s=b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t,s)}(window, document,'script', 'https://connect.facebook.net/en_US/fbevents.js'); fbq('init', '552010715551636'); fbq('track', 'PageView');