Home
Speaking
Consulting
Presentations
Media
Contact
About
Testimonials
Certifications
Upcoming
Books
Unplugged: Luddites’ Guide to Cybersecurity
The Most Important Secrets To Getting Great Results from IT
Blog
Links
917-685-7731
917-685-7731
raj@brainlink.com
Cyber Criminals Are Targeting Law Firms. Learn How To Protect Your Business!
November 7th, 2013
Download Presentation
Presentations
Sure, The Cloud Is Convenient – But Is It Secure?
Listen To Evolved Radio Podcast And Gain Key Business Insight
Data/Cyber Security for Lawyers – Safeguarding Your Clients’ Information & Protecting Your Firm
BOMA/NY (Building Owners and Managers Association of NY)
First Fridays with Raj: SOP Culture – ConnectWise Project Board – Secret to KILLER Proposals and MASSIVE Profitability
ConnectWise Project Board – Secret to KILLER Proposals and MASSIVE Profitability
First Fridays with Raj: SOP Culture – Creating OBVIOUS SOPs
Panopticon 2015: Continued Erosion of Privacy Rights (and Occasional Victories)
First Fridays with Raj: How 400 SOPs Can Change Your Life
2015 Trends in Financial Crimes
First Fridays with Raj – Accelerating Employee Training Using SOPs
Protecting Information as We Move Toward the Mobile Office: HIPAA, Confidentiality and Consent
Mouseveillance: Is Your Privacy Being Mickey-Moused?
What You Need to Know About the Advanced Malware Apocalypse
Cyber Criminals Are Targeting Law Firms. Learn How To Protect Your Business!
A Global Overview of Trends in Private, Corporate and Government Surveillance
Lessons Learned From The FTC
GBATA 2013 Keynote Presentation – A Global Overview of Trends in Private, Corporate and Government Surveillance
Are You Googling Your Clients’ Privacy Away?
Annual NYS Cyber Security Conference
Sustainable Defense: How To Stop Chasing Security and Win the Battle
A Global Perspective on Mobile Security, Privacy and Safety
GBATA 2012 Keynote Presentation – Social Media & Cloud Computing Threats to Privacy, Security and Liberty
What to Teach Your Kids, Employees and Interns about Social Media
Trends In Financial (cyber) Crimes
Regulatory Compliance While Reducing Enterprise Risk
Streamlining and Ensuring Continuous Compliance
New HIPAA Rules and EHRs: ARRA & Breach Notification
Watching the Watchers