Naveen Khan is the Director of AI and Innovation for HORNE’s Intelligence and Automation practice . She is responsible for overseeing the strategy, implementation and optimization of key emerging technologies and leading AI-driven product development.
Preparing for a SOC 2 (System and Organization Controls 2) audit is essential to demonstrate your organization’s commitment to information security, privacy and compliance with industry standards.
Cybersecurity and cyber insurance are a priority in today’s world, but in the past few years, these issues have become even more important for companies with employees working remotely. Working from home has multiplied the risks and occurrences of data breaches, and breach costs also have grown.
In most companies, developers are focused on meeting project deadlines, and that often leads to applications that are insecurely coded. Custom development can multiply vulnerabilities. Some 48 percent of developers think they leave vulnerabilities in their code, according to the State of Developer-Driven Security Survey 2022 from Secure Code Warrior.
Cybersecurity risks challenge your business development. You need to address the bad risks so you can take the good risks that let you grow and maneuver to stay ahead of your competition.  You also need expert insights into cyber risk and how you must defend your organization and protect your growth.
While 2020 and 2021 brought about unprecedented high sales for many quick-serve/fast casual concepts, 2022 has brought unprecedented lows. With bills to pay, loan covenants to meet and employees to retain, the pressure is mounting and where do you start? Acknowledging times are tough is the first step.
Brad serves as the Chief Information Security Officer for HORNE where he leads cyber security programs and initiatives for the firm. He manages offensive cyber security operations for HORNE and its clients, where he leads on collaborating with executive leadership teams to strengthen their security posture.
Statistics indicate baby boomers account for more than 50% of the construction industry. That means half of owners, along with their skills and knowledge, are headed towards retirement. Even more alarming is only half of those owners have a succession plan. If your company faces a disruption or change in ownership it reduces its chance of survival to only a small percentage. Even owners who don’t have an immediate retirement on the horizon need to have a plan.
Manage Cookie Consent
This website stores cookies on your computer. We use this information to improve and customize your browsing experience and for analytics and metrics about our visitors.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.