Upcoming MRK Events

Information Security Summit

Join MRK Technologies CISO's Jack Nichelson and Jason Middaugh at the 2019 Cleveland Information Security Summit on October 24th and 25th. The two will be presenting the topic "Identity as the New Perimeter- Here's How You Can Adapt and Protect Your Organization". In this talk, Jack and Jason will provide real-world examples and how to apply both traditional and new security controls/tools to help secure your environment. Recommendations will include how to prevent external threats like account takeovers and internal threats like cached credentials and password reuse. Click here for more information.  

Find out more »

Identity as the New Perimeter

Cleveland IX Center
1 I-X Center Dr
Cleveland, OH 44145 United States

Join MRK Technologies CISO's Jack Nichelson and Jason Middaugh at the Cleveland IX Center (Room 21) for a deep dive into "Identity as the New Perimeter - Here's How You Can Adapt and Protect Your Organization" 81% of the attacks used stolen credentials. 86% of passwords are terrible. And as the CISO of your organization, you are responsible for keeping your enterprise safe; even while the majority of users and system accounts are working against you. Data is leaving the four walls of your data center and going to the cloud at an alarming rate. What could possibly go wrong? In this talk, Jack and Jason will provide real-world examples and how to apply both traditional and new security controls/tools to help secure your environment. Recommendations like how to prevent external threats like account takeovers and internal threats like cached credentials and password reuse. The new perimeter identities whether you are still on-premise or in the cloud, learn how to better protect your organization and minimize the likelihood that your company becomes the Next Big Breach.

Find out more »

Atomic Security Panel

Cleveland IX Center
1 I-X Center Dr
Cleveland, OH 44145 United States

Join MRK's Jack Nichelson at the Cleveland IX Center (Room 16) for a back to basics panel that will provide specific and actionable ways to protect your organization and data from the most common attack vectors.  A principal benefit of the Basic CIS Controls is that they prioritize and focus a smaller number of actions with high pay-off results. The Basic CIS Controls are effective because they are derived from the most common attack patterns highlighted in the leading threat reports. 1.  Inventory and Control of Hardware Assets 2.  Inventory and Control of Software Assets 3.  Continuous Vulnerability Management 4.  Controlled Use of Administrative Privileges 5.  Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers 6.  Maintenance, Monitoring and Analysis of Audit Logs

Find out more »

Past MRK Events

Three Rivers Information Security Symposium

October 11 @ 1:00 pm - 3:00 pm

FBI InfraGard Meeting

June 7 @ 7:30 am - 3:30 pm

Breaches & Brews

May 28 @ 4:00 pm - 7:00 pm

2019 Central Ohio InfoSec Summit

May 24 @ 10:15 am - 11:00 am

2019 Central Ohio InfoSec Summit

May 23 @ 10:15 am - 11:00 am

CISO de Mayo

May 2 @ 2:00 pm - 5:00 pm

MRK Topgolf Event

April 17 @ 4:00 pm - 7:30 pm

Sophos Synchronized Security Lunch & Learn

March 21 @ 11:00 am - 1:30 pm

ISSA Monthly Meeting

March 20 @ 8:30 am - 1:00 pm

Breaches and Brews Threat Intel Discussion

January 31 @ 4:00 pm - 7:00 pm

IoT Speaking Event

January 30 @ 10:00 am - 1:00 pm

Hitachi IoT Information Session

December 6, 2018 @ 1:30 pm - 3:30 pm

Health Care Law Speaking Event

December 5, 2018 @ 9:30 am - 5:00 pm

Security Event Recap

November 8, 2018 @ 2:00 pm - 5:00 pm

Sophos Brewery Event

November 7, 2018 @ 4:00 pm - 5:00 pm

FireEye Webinar

October 25, 2018 @ 11:00 am - 12:00 pm

2018 Cleveland InfoSec Summit

October 25, 2018 - October 27, 2018

Northwest Ohio ISSA Meeting

October 18, 2018 @ 8:00 am - 12:30 pm