Videos

An Overview of Cloud Security

Fraud, Cybersecurity and Compliance risks are prevalent throughout organizations and often have a devastating effect on earnings & reputations. Learn from our consultants with 40 years of experience protecting and safeguarding organizations of all types, how to protect YOUR organization.  Download the Presentation

...
Cybersecurity Maturity Model Certification

During this webinar, The Bonadio Group and FoxPointe Solutions discussed important internal control and operational considerations every manufacturer and distributor should be evaluating. The focus was on the pandemic-changed work environment with topics covering cyber security and staff awareness, fraud and remote work vulnerabilities, and operational control considerations in a hybrid...

Computer Keyboard Typing

FoxPointe Solutions and The Bonadio Group partnered with Nixon Peabody discussing The Department of Labor’s recently issued guidance on cybersecurity practices for ERISA retirement plans. FoxPointe Solutions is solely responsible only for the content of FoxPointe Solutions authored information and is subject to change at any time. Any forward-looking statements...

Cybersecurity

Watch John Roman, CISSP and FoxPointe Solutions along with partners CETech and SNT (Secure Network Technologies) as they show you how easy it is for criminals to purchase your data on the Dark Web. Lunch at Café Dark Web Webinar Lunch at Café Dark Web Webinar This interactive and informational...

risk assessment

Watch John Roman, CISSP sit down with Jeff Hootselle of Auditmacs on Tech Talk USA as they discussed various information security trends. Tech Talk is a weekly TV segment that focuses on trending topics, the best practices, and overall successes of different business approaches in the fast-paced, ever-changing tech industry....

Technology Security

Charlie Wood, QSA/CISA/CCSFP and Allison Hall, PCIP, CCSFP, recently sat down with partner, Cadre, to discuss why service organizations should be SOC 2 compliant. Learn more by viewing the video below. Why Should Service Organizations Become SOC 2 Compliant? Cadre Information Security enables operationally obsessed, mid-market companies to lower their...