Free webinar – Digital Security

Business is hard!

Doing business is complicated!

3d people - man person with toolbox and wrench. Engineer

3d people – man person with toolbox and wrench. Engineer

Keeping your business head above water is a never ending struggle.

I know, I am there too!

I’m probably not telling you anything that you didn’t already know.

Your organisation is under threat from so many quarters, both seen and unseen.

Cash flow, marketing, sales, manufacturing to name just a few.

What about digital security – have you got that covered or is it another part of the overall business problems that you face?

Anything for gratis, that delivers great business insight, should be good.

Let me show you how to manage the complexity of the digital security world.

Show you how small and medium business and not for profit organisations can protect themselves.

This one hour webinar, the second in the series, will show you how using my simple and easy to understand digital security framework can help secure your digital assets.

No sales Hype!

No vendor “Buy this cause it is the best CRAP!”

This webinar looks at how your focus on technology is as important as the other three components.

We will be discussing hardware, software, AV, authentication, encryption, patching and best practice.

This is a brief look at using this framework to protect your organisation.

This is the second webinar in the series. A recording of the first one is HERE.(

Sign Up HERE, Thursday 3/12/2015 1130 Australian Eastern Daylight Saving Time. (

Roger Smith is the CEO of R & I ICT Consulting Services, Amazon #1 selling author on Cybercrime, author of the Digital Security Toolbox and author of the SME Digital Security Framework.   Rapid Restart Appliance Creator.   He is a Speaker, Author, Teacher and Educator on cybercrime and how to protect yourself from the digital world. 

Here is a synopsis of the webinar

Building a security framework around your organisation.
  • Quick introduction
  • Why we need a framework for small and medium business and NfP
  • Quick look at the framework
  • Using the CIA – the importance of the DATA
    • confidentiality, 
    • integrity, 
    • availability
  • Let’s focus on the technology component
    • Hardware
      • Firewalls
      • Perimiter Defence – north south compared to east west
      • Next generation defences 
        • intrusion detection
        • UTM – unified threat management
        • APT – advanced persitant threats
      • Newest systems v’s oldest systems – legacy systems
      • BYOD
      • Smart devices
    • Software
      • Operating systems
      • Applications
      • Apps
    • Anti Virus
      • Why we still need it
      • What do we need it for
      • End point protection / AV, malware, spyware
    • Authentication
      • Username and passwords
      • Default passwords
    • Encryption
      • Why we need to employ it
      • In transit
      • At rest
      • VPN / WiFi
      • Principles
      • Dos and don’ts
    • System management
      • Visibility
      • Accountability
      • Manageability 
    • Data seperation
      • Flat network
      • Segregation 
      • Users and data
    • Best practice
      • Why we need them
      • What are they
      • What do they do
Where does all this fit into the framework
How do you know if it is all in the right place and working?
Where to from here

Roger Smith, is an educator. Teaching students at ADFA (UNSW) and showing them how vulnerable they are to cybercrime.

He is also CEO at R & I ICT Consulting Services Pty Ltd, an Amazon #1 author on Cybercrime and founder of the SME Security Framework. He is a Consultant who specialises in inexpensive and highly effective security strategies for small and medium businesses and not for profit organisations.

He has developed and authored the SME Security Framework and the Security Policy Training Course which are considered to be the definitive guides to helping SME's protect their organisation using the principles of Technology, Management, Adaptability and Compliance.