• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
RKON

RKON

Private Equity Services

  • About RKON
    • Our Team
    • Our Philosophy
    • Our Partners
    • Testimonials
    • Careers
  • Resources
        • Articles
        • Case Studies
        • Podcasts
        • Video Testimonials
        • Events and Webinars
        • White Papers
        • Datasheets
  • Private Equity
        • Featured

          Project Ransom: Manufacturer Stops Loss of $1M/Day After Security Breach

        • Technology Advisory
          • Artificial Intelligence
          • Due Diligence
          • 100 Day Plan
          • IT Roadmap
          • IT Security & Compliance
          • IT Diagnostic
          • Portfolio Security Assessment
          • Software Engineering
        • Mergers & Acquisitions
          • Carve-Out
          • Platform Creation
          • Post-Merger Integration
  • Enterprise Services
        • IT Advisory
          • Cloud Infrastructure
          • Cloud Journey Roadmap
          • IT Roadmap
          • IT Diagnostic
        • IT Execution
          • Modern Workplace
          • IT Transformation
          • Cloud Migration
          • Microsoft Azure Migration
          • Software Engineering
        • Managed Services
          • IT Help Desk
          • Compliant Cloud
          • Microsoft Azure Management
        • Security Services
          • vCISO
          • Security Assessment
          • Managed Detection Response
          • Security Breach Recovery
          • Cloud Security
          • Identity & Access Management (IAM)
          • Governance Risk & Compliance (GRC)
          • Zero Trust
          • Penetration Testing
  • Contact Us

The Value of an Azure Cloud Migration

Blue illustration of a cloud icon.

SecureChat host Cory Pomeroy and Derek Myronuk breakdown and discuss the importance of moving organizations to the cloud – specifically Microsoft Azure cloud.

Where are all the Women in IT?

Woman working on desktop computer.

SecureChat host Cory Pomeroy is joined by RKON’s Deisy Mascote, and Dannie Asante-Appiah, to discuss their experiences as women working in the tech industry.

The Colonial Pipeline Hack: See Something, Say Something

Two workers looking into ipad and being amazed

SecureChat host Cory Pomeroy is joined by RKON Service Desk Analyst, Deisy Mascote, to discuss the most recent ransomware attack that has affected the nation – the Colonial Pipeline hack.

2021: We’re Off to a Fast Start

Man pointing to illustration of abstract cyber security rendering.

This week, SecureChat host Cory Pomeroy is joined by Account Executive, Derek Myronuk, to discuss a recent data breach that compromised the patient health information of 3.5 million individuals.

What’s Up With Your HIPAA?

Blue illustration of a lock icon.

SecureChat host Cory Pomeroy and Account Executive, Derek Myronuk, discuss the importance of IT and security in the healthcare industry.

Cloud News: Hindsight After the Hack

Illustration of a gold padlock and key with blue background.

In this episode, SecureChat host Cory Pomeroy and Account Executive, Derek Myronuk, discuss the most recent cloud security hacks that have reached the news.

Insights into a Post-COVID IT World

Laptop keyboard.

In this special episode, RKON CEO, Jeff Mullarkey, and Managing Director, David Wright, sit down with Kaseya COO, Joe Smolarski, to discuss the impact COVID has had on IT service providers.

Key Steps to Securing Your Cloud Environment

Business man working on laptop with and illustration of white lock icons.

SecureChat host Cory Pomeroy is joined by Account Executive, Derek Myronuk, to discuss the crucial and necessary steps to take when securing your cloud environment.

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Go to Next Page »

Primary Sidebar

Recent Posts

  • Cost Optimization vs. Value Creation: Rethinking IT Managed Services ROI
  • When and Why to Outsource: Freeing IT to Deliver Business Value with a Trusted Advisor
  • IAM Compliance Checklist: Achieving SOC 2 Compliance with IAM Risk Management Solutions
  • Exploring Penetration Testing: PTaaS vs Traditional Pen Testing
  • Don’t Wait for a Breach: 7 Reasons to Review Your IAM Maturity Now

Want more insights?

Subscribe to our email newsletter for news and updates

  • Home
  • About RKON
  • Resources
  • Industries
  • Private Equity
  • Enterprise Services
  • Contact Us
  • RKON’S Digital Privacy

Footer

RKON transparent logo
Find Us on YouTube Find Us on Facebook Find Us on LinkedIn Find Us on Twitter
(312) 654-0300 328 S Jefferson Street #450, Chicago IL, 60661

Subscribe to our email newsletter for news and updates

We use cookies to offer you a better experience and analyze site traffic. By continuing to use this website, you consent to the use of cookies in accordance with our Privacy Policy.