security analysts marie bueler emmett koen paul mcmillan director chris green
TRANSCRIPT
![Page 1: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/1.jpg)
Security Analysts
Marie Bueler
Emmett Koen
Paul McMillan
*Information Security
DirectorChris Green
![Page 2: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/2.jpg)
![Page 3: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/3.jpg)
Encryption
![Page 4: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/4.jpg)
Encryption
Vulnerability Scans
![Page 5: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/5.jpg)
Encryption
Two Factor Vulnerability Scans
![Page 6: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/6.jpg)
Encryption
Cloud Storage
Two Factor Vulnerability Scans
![Page 7: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/7.jpg)
Encryption
Cloud Storage
Two Factor
Patch Manageme
nt
Vulnerability Scans
![Page 8: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/8.jpg)
Encryption
Cloud Storage
Two Factor
Patch Manageme
nt
RiskAssessme
nts
Vulnerability Scans
![Page 9: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/9.jpg)
Encryption
Cloud Storage
Two Factor
Mobile Device
Management
Patch Manageme
nt
RiskAssessme
nts
Vulnerability Scans
![Page 10: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/10.jpg)
Encryption
Cloud Storage
Two Factor
Mobile Device
Management
Patch Manageme
nt
RiskAssessme
nts
Vulnerability Scans
Phishing
![Page 12: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/12.jpg)
![Page 13: Security Analysts Marie Bueler Emmett Koen Paul McMillan Director Chris Green](https://reader036.vdocuments.net/reader036/viewer/2022083008/56649efc5503460f94c0f076/html5/thumbnails/13.jpg)
*For additional information
http://www.uttyler.edu/iso
UTS 165
If you ever have any specific questions relating to Information Security, please email us at [email protected]