
What we’re about
A community for IT professionals, business owners, and tech-curious leaders seeking real answers to real-world support and maintenance challenges. Whether you're managing 10 endpoints or 1,000, we meet to demystify the tech, swap stories, and help each other thrive.
Topics of Conversation:
Incident Response
Vulnerability Management
BCP / DR
IT Compliance
Risk Assessments
Company Policy and Procedures
Hope to see everyone soon!
Upcoming events (1)
See all- “Fix My Stack” for IT ManagersLink visible for attendees
Bring your current IT mess—live conversation, therapy session. Let our roundtable suggest potential fixes to your current headaches.
L1/L2 Tech Engineers and IT operations support staff are welcome.
Focus:
Access Control: The Washington Examiner reveals Microsoft’s risky use of China-based engineers to maintain DoD systems, overseen by underqualified “digital escorts,” exposing sensitive data to potential cyber threats. https://lnkd.in/gMbssZar
Regular user access reviews could have flagged these oversight gaps, ensuring only authorized personnel have access to critical systems. We have perfected user access reviews to uncover vulnerabilities like these, safeguarding your organization’s security.
AKA: Principle of Least Privilege