Sign in to view Vincent’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Hollywood, Florida, United States
Contact Info
Sign in to view Vincent’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
972 followers
500+ connections
Sign in to view Vincent’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Vincent
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View mutual connections with Vincent
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Sign in to view Vincent’s full profile
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
or
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Experience & Education
-
City of Fort Lauderdale
**** ** ************** & **********
-
***** ****** *********, ***
*********** ********** / ************* **********
-
******* ****** ****** *******
******* ***** *********** *******
View Vincent’s full experience
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Welcome back
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
View Vincent’s full profile
Sign in
Stay updated on your professional world
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
New to LinkedIn? Join now
Other similar profiles
-
Derek Richardson
Fort Lauderdale, FLConnect -
Jason Swift
Division Manager - Public Safety Technology, City of Fort Lauderdale
Miami, FLConnect -
Phillipe Lahens
Fire Inspector
Fort Lauderdale, FLConnect -
Djordge Duverval
Miami-Fort Lauderdale AreaConnect -
Petal L.
ServiceNow ITSM/ITAM/SPM/CMDB Senior Business Process Consultant and Solution Architect
Miami-Fort Lauderdale AreaConnect -
Dale Bondanza, MBA, PMP
Fort Lauderdale, FLConnect -
James M. Mackey Jr.
Assistant Comptroller
Stony Point, NYConnect -
james mackey
Student at Miami Dade College
Miami, FLConnect -
lewis burzynski
Veteran IT Specialist | Bridging Military Discipline with Cutting-edge Technology | Network Management Expert
Fairbanks, AKConnect -
Jo Ann Rolle
Beauty, Style, and Music Management
Pompano Beach, FLConnect -
Paul Baker
Ownr
Fort Lauderdale, FLConnect -
theodore marshall
Miami, FLConnect -
Karley Burzynski
Property Manager at MacArthur Properties
Fairbanks, AKConnect -
Sharese Bora
Administrative Assistant
Homestead, FLConnect -
Lorena Rodríguez Lira
Intérprete-Traductor
Atizapán de Zaragoza, MEXConnect -
Shawn McQuaid
teacher at Broward County Public Schools
Fort Lauderdale, FLConnect -
Noé Bautista
Gerente General en Comercialización Integral Metropolitana SA de CV
MexicoConnect -
Thomas "Dan" McLeod
Security Architect at Palm Beach Sheriff's Office
West Palm Beach, FLConnect -
Shawn McQuaid
Hi my name is Shawn, it is nice to meet you.
Greater Toronto Area, CanadaConnect -
Yosvany M.
Technical Support Analyst at Fort Lauderdale IT dept
Miami, FLConnect
Explore more posts
-
Check Point Mind
Check Point MIND is collaborating with Red Education to offer the Women in Cybersecurity Training Scholarships. This initiative supports women's participation in cybersecurity through the CCSA training course provided by Check Point's Premier Authorized Training Partner, Red Education. Learn more at https://buff.ly/3xG1mJV #RedEducation #cybersecurity
21
1 Comment -
SK Woyton Consulting, LLC
🔊 The DoD CIO web page provides great resources and an overview of CMMC Assessments CMMC 2.0 implements tiered assessment requirements based on the sensitivity of the information shared with a contractor. Upon implementation of CMMC 2.0: Contractors who do not handle information deemed critical to national security (Level 1 and a subset of Level 2) will be required to perform annual self-assessments against clearly articulated cybersecurity standards. Contractors managing information critical to national security will be required to undergo CMMC Level 2 third-party assessments. The highest priority, most critical defense programs (Level 3) will require government-led assessments. Self- Assessments The Department views Level 1 as an opportunity to engage its contractors in developing and strengthening their approach to cybersecurity. Self-assessments will suffice to meet CMMC Level 1 requirements. Likewise, a subset of programs with Level 2 requirements do not involve information critical to national security, and associated contractors will be permitted to meet the requirement through self-assessments. Contractors will be required to conduct self-assessment on an annual basis, accompanied by an annual affirmation from a senior company official that the company is meeting requirements. The Department intends to require companies to register self-assessments and affirmations in the Supplier Performance Risk System (SPRS). Third-Party Assessments Once CMMC 2.0 is implemented, contractors will be required to obtain a third-party CMMC Level 2 assessment for a subset of acquisitions that involve information critical to national security. Read more @ https://lnkd.in/e9icfr_A 😉
-
Rensselaer Cybersecurity Collaboratory
Come see Shoshana Sugerman and Brian Robert Callahan, Ph.D., CISSP, CISM #today at 3:30 PM at the #nyscyber NYSCSC! They're the talk all the way in the bottom right corner! Rensselaer Polytechnic Institute #cybersecurity #cybersec #infosec #informationsecurity #security #conference #generativeai #ai #genai #artificialintelligence #RPI #RPI200
14
-
Industrial Cyber
"In February 2006, the cyber response community came together for the first time in Cyber Storm I to examine the national response to cyber incidents." https://lnkd.in/g8SeUdh7 #Cybersecurity #CyberExercise #CISA #CriticalInfrastructure #industrialcyber #icssecurity #ics #Preparedness #Resilience
-
Jün Cyber
Stay ahead of cyber threats with updated guidelines for safeguarding Controlled Unclassified Information (CUI). Let Jün Cyber help you achieve compliance with expert gap analysis, tailored plans, staff training, and continuous monitoring. 🛡️ Secure your data. Contact Jün Cyber today! www.juncyber.com #CyberSecurity #NIST800171 #CUISecurity #JunCyber #DataProtection
2
-
James Forsythe
Ransomware isn’t just a tech issue; it’s a wake-up call for organizational resilience. Challenge accepted norms: view it as an opportunity to innovate, strengthen defenses, and foster a culture of cybersecurity awareness. Turn this threat into a catalyst for growth and strategic security advancements. #FightThePhish #CybersecurityFirst #InnovateAgainstThreats
4
-
InfoTechSix
### Information Security Tip of the Day **🔒 Encrypt Sensitive Data!** Protecting your sensitive data is crucial. Here are some key tips on encryption: - **Use Strong Encryption Methods**: Employ AES-256 or other industry-standard encryption algorithms to secure your data. - **Encrypt Data in Transit and at Rest**: Ensure that sensitive data is encrypted both when it's stored and when it's being transmitted over networks. - **Regularly Update Encryption Keys**: Periodically change your encryption keys and follow best practices for key management. Keep your information secure and private with InfoTechSix www.infotechsix.com #InfoSec #CyberSecurity #TechTips #InfotechSix
-
Gesso Solutions International
https://lnkd.in/eT_prjYY #CMMC Practitioner Pro Tip: When an Organization Seeking Certification (OSC) reaches out to a CMMC Third Party Assessment Organization (C3PAO) for a CMMC evaluation, it is essential for the OSC to specify the particular units within their organization that will participate in the assessment. There are three specific scoping units to be identified: the Headquarters (HQ) Organizational Unit, the Host Unit, and any Supporting Units. It is mandatory for the OSC to clearly define their HQ Organizational Unit, their Host Unit (should it be distinct), and all Supporting Units during their CMMC Assessment request.
-
Industrial Cyber
"The U. S. Cybersecurity and Infrastructure Security Agency CISA updated the Secure Tomorrow Series Toolkit to assist in raising preparedness among critical infrastructure owners and operators." https://lnkd.in/gCYKTW4w #IndustrialCybersecurity #CriticalInfrastructure #CISAToolkit #CyberPreparedness #industrialcyber #icssecurity #ics
-
Virginia Information Technologies Agency
Attention security vendors! 🔐 VITA has published a request for proposals (RFP) for enterprise Managed Security Services (MSS) on eVA, Virginia’s e-procurement portal. Interested security vendors should submit their proposals before the RFP closes on July 15. The MSS RFP presents a strategy shift in how future MSS will be delivered. Supplier(s) will be responsible for providing enterprise MSS for two service categories, including security operations center (SOC), and/or security engineering (SEC-ENG). VITA may award one or more awards as a result of this sourcing effort, which could result in different suppliers providing SOC and SEC-ENG services. Supplier(s) will be required to integrate into VITA’s multisourcing service integrator model and provide security services that are flexible, rapidly provisioned, cost effective, transparent and elastic to meet the current and future needs of VITA and customer agencies. Learn more about the RFP here: https://lnkd.in/eW-w4dTU #Virginia #RequestForProposals #CyberSecurity #RFP #eVA
41
-
Liz Sujka
📢If you are a CISO in the Fort Myers, FL area, this is an event that you won't want to miss! Find out more and register - https://lnkd.in/eNCZx_-u Join the team from Sedara, principia/RAID, and CISOs from across the US as we collectively explore vital topics that are top of mind. Just to mention a few- Intelligent Defense: How AI is shaping the future of threat detection and response. From Strategy to Action: Operationalizing Cybersecurity in Today's Landscape.
4
1 Comment
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Vincent Vinueza
1 other named Vincent Vinueza is on LinkedIn
See others named Vincent Vinueza