Continuing Education

- SOC: In-house vs. Out-Sourcing - SANS 2016

- Financial Services Security Vendor Briefing - SANS 2016

- Data Breach Intelligence That Matters - ISACA 2016

- Office 365 Security & Risk Benchmarks - SANS 2016

- Assessing Cyber Risk Appetite - ISACA 2016

- Cybersecurity Evolves - ISACA 2016

- Your Threat Intelligence Program - SANS 2016

- Securing Company Data in the Cloud - ISACA 2016

- SSH Keys: Access Out of Control - ISACA 2016

- Proactive Cyber Hunting Approach - SANS 2016

- Europe Threat Survey Report - SANS 2016

- ICS Cybersecurity Into Water Utility Planning - SANS 2016

- Pragmatic Networking - ISACA 2016

- Credit Union Detected LAN Turtle Attacks - SANS 2016

- Threat Intelligence Vendor Briefing - SANS 2016

- Threat Landscape Survey Report - SANS 2016

- Effective Third-Party Risk Assessment - ISACA 2016

- Convergence and Industrial Cybersecurity - ISACA 2016

- Health Care Security - SANA 2016

- Incident or Breach? - SANS 2016

- Layered Security Strategies Don't Work - SANS 2016

- Protect Yourself World with No Parameters -  ISACA 2016

- Ransomware Dominating  Threat Landscape  - SANS 2016

- How a Managed Bug Bounty Program - SANS 2016

- Criteria for Hardware-Based Encryption - SANS 2016

- Conquering all Stages of the Attack Lifecycle - SANS 2016

- SANS 2016 ICS Survey - SANS 2016

- Bridging the Insurance/InfoSec Gap - SANS 2016

- Building a Road to GRC Maturity - ISACA 2016

- PIM/PAM in Today’s Infosec - SANS 2016

- Incident Response Capabilities in 2016 - SANS 2016

- How to Negotiate a Cyber Insurance Policy - SANS 2016

- Scapy and Snort, Packet PB & J - SANS 2016

- Practical and Open Source Threat Intelligence - SANS 2016

- Stopping CEO Fraud - SANS 2016

- Managing Applications Securely - SANS 2016

- Overcome Privilege Management Obstacles - SANS 2016

- DNS Evidence - SANS 2016

- Cyber threats: Methodologies and Tools - SANS 2016

- Cyber threats: Threat Hunting 101 - SANS 2016

- The Inverted Cloud of Operability - ISACA 2016

- Threat Hunting Methodologies and Tools - SANS 2016

- Protecting the Software Defined Data Center - ISACA 2016

- Threat Hunting 101 - SANS 2016

- EU Regulation’s Impact on Cyber Security - ISACA 2016

- Mobile forensics tool - SANS 2016

- Gamification of a Fortune 20 SOC - SANS 2016

- Developing Robust Trojan Defenses - ISACA 2016

- Mapping Attack Infrastructure - SANS 2016

- Evolving cyber Gatherers to cyber Hunters  - SANS 2016

- Security Awareness Report Key Findings - SANS 2016

 -Preparing for the Inevitable Cyber Breach - SANS 2016

- Mobile Data Loss – Threats/Countermeasures - SANS 2016

- Facilitating Fluffy Forensics - SANS 2016

- Enable inspecting TLS/SSL traffic - SANS 2016

- Compliance and Detecting Suspicious Activity - SANS 2016

- Benchmarking AppSec -  SANS 2016

- Learning Defends Against Zero-Day Threats - ISACA 2016

- Managing Your Top Seven Human Risks - SANS 2016

- The State of Cybersecurity - ISACA 2016

- Cyber Investigations Law, Ethics & Evidence - SANS 2016

- Security in the Cloud - ISACA 2016

- Securing Mobile Data and Devices - SANS 2016

- Communicating to CEOs& Directors - SANS 2016

- Security Leadership: Strategies for Success - SANS - 2016

- IT Security Spending Strategies – SANS - 2016

- Threat Hunting - SANS 2016

- GDPR Will Mean to Global Businesses- ISACA 2016

- Application Security -  SANS 2016

- Enhance ICS Security - SANS 2016

- Economics of Cyber Attacks - ISACA 2016

- Critical Controls - SANS - 2016

- Threat Intelligence Awakens - SANS 2016

- Effective Breach Investigations -  ISACA 2016

- Web API Security -  SANS 2016

- Security in Windows 10 and Server 2016 - SANS 2016

- Threat Intelligence - SANS 2016

- Partnering with a Cyber Security Vendor - SANS 2015

- Predicting Cyber Security Trends - SANS 2015

- Third-Party Risk Management - ISACA 2015

- AML and BSA: Overcoming the Challenges - IIA 2015

- Leveraging Network Intelligence - SANS 2015

- Certifications that Matter - SANS 2015

- Compliance does not equal security - SANS 2015

- Monitor Third Party Cybersecurity - SANS 2015

- Cyber Centric Enterprise Dynamic Security- ISACA 2015

- Encrypting Managing Those Keys - ISACA 2015

- Security Awareness Programs - SANS 2015

- Hacked, or Human Error - SANS 2015

- ICS Cybersecurity - SANS 2015

- Network Attack Methods - ISACA 2015

- State of Cybersecurity - ISACA 2015

- Securing Data in age of  Mega Breaches - ISACA 2015

- Securing Smart Devices - ISACA 2015

- Crack the Code - ISACA 2015

- Full Circle Threat Management - ISACA 2015

- COBIT 5 for Business Benefits – ISACA 2015

- Third-Party Information Security – ISACA 2015

- Requirements in Access Management – ISACA 2015

- Cyber Threats Thru Security Intelligence – ISACA 2015

- Data Breaches MISS detection – ISACA 2015

- Advances in Android and iOS Attack – ISACA 2015

- Cybersecurity Share Information – ISACA 2015

- Auditing VoIP Networks – ISACA 2015

- Harsh Reality of Cyber Protection – ISACA 2015

- Auditing VoIP Networks – ISACA 2015

- Cybersecurity in e-governance – ISACA 2015

- Collaborating, Communicating – ISACA 2014

- Security for a Maturing Cloud – ISACA 2014

- Cybersecurity workforce – ISACA 2014

- Cybersecurity - IBAT 2014

- CobiT 5 – ISACA

- Mobile Security, ISACA 2014

- North America CASA Conference 2014 – ISACA

- Cybersecurity, ISACA 2014

- 2013 State of Cybercrime Today - Threats and Solutions

- 2013 IBAT Annual Conference

- Real Estate Broker (State of Missouri, 1982-89)

- Securities Salesman (NASDA, 1984-86)

- 2013 ISACA Managing and securing the mobile onslaught

- North America CASA Conference 2013 - ISACA

- TechMeca IBAT Conference, 2013

- Speaker at the annual ABA Compliance Conference

- Speaker at the annual conference for Credit Union Directors

- ICBA’s Community Bank Technology Conference, 2012

- Controls for Cyber Defense, ISACA 2014

- Providing Security from Cyber threats, ISACA 2012

- TechMeca IBAT Conference, 2012

- Information Security Conference, ISACA 2011

- ISACA - Security Management in the Cloud – 2011

- Securing and Audit Your Virtual Environment, ISACA 2011

- North America CASA Conference 2011 - ISACA

(Cloud and virtual machine auditing)

- TechMeca Conference, 2011

- IS Security & Risk Management Conference, ISACA: 2010

- Using Risk Based Approach – ISACA 2015

- Manage, monitor, & audit mobile users – ISACA 2015

- Data Protection and Privacy – ISACA 2015

- TechMeca Conference, 2010

- IS & Risk Management Conference, ISACA: 2009

- Network Security Conference, ISACA: 2008

- North America CASA Conference 2008 - ISACA

- Network Security Conference, ISACA: 2007

- North America CASA Conference 2007 - ISACA

- ISACA: 2007 – Update on CobiT

- ISACA: 2007 – Security Access Management

- Network Security Conference, ISACA: 2006

- ICBA Tech World, 2006

- TechMeca Conference, 2006

- Technology in Banking, TBA 2006

- Network Security Conference, ISACA: 2005

- North America CASA Conference 2005 - ISACA

- Network Security Conference, ISACA: 2004

-  ISACA - Key Tools to Network Security 2004

- Enterprise Network Security 2004

- Network Security Conference, ISACA: 2003

- Information Security Conference, OTS: 2002

- Auditing IT Security, ISACA: 2001

- Governor's Leadership Program: 1993-96

- Tom Hopkins' Sales Course: 1982

- Bank Examination School, Instructor's School, FDIC, Washington, D. C.: 1979

- LSU School of Banking of the South, Class - 1978

- EDP Examinations - Conference of State Bank Supervisors, University of Chicago: 1973

- Meramec Junior College, Kirkwood, Missouri: 1971-72

- University of Missouri, Columbia: 1964-66

- Numerous courses with the ABA since 1964
Yennik, Inc. - R. Kinney Williams

All rights reserved; Our logo R. Kinney Williams & Associates is registered with the United States Patent and Trademark Office.
Terms and Conditions, Privacy Statement, Copyright Yennik, Incorporated

We are Americans and will never be defeated.