November 24, 2016
Stop by Booth 118 @ AWS re:Invent to Learn How We Can Secure Your Cloud
by Mariam Es-Haq

Vice President, Corporate Operations at MindPoint Group
Mariam Es-Haq is a MindPoint Group co-founder and Vice President responsible for business strategies, partnerships, and corporate operations.
Latest posts by Mariam Es-Haq (see all)
- 2018 YEAR IN REVIEW:Diversity Leader in Cybersecurity - December 27, 2018
- Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts - November 24, 2016
- Stop by Booth 118 @ AWS re:Invent to Learn How We Can Secure Your Cloud - November 24, 2016
Next Stories

1/4
A Day in the Life at MPG: Cybersecurity Program Support
This month we’re interviewing Bilal, a Cybersecurity Program Support Consultant at MindPoint Group. In this blog, you’ll learn about Bilal’s…
Read More
2/4
A Day in the life at MPG: Proposal Specialist
This month we’re interviewing Terri, a member of the Growth team at MindPoint Group. In this blog, you’ll learn about…
Read More
3/4
A Quick Guide to NIST 800-53, NIST 800-171, and CMMC, and FedRAMP
Before I got into cybersecurity, I had no idea what NIST (National Institute of Standards and Technology) was, what risk…
Read More
4/4
What a Difference a Year Makes
Six Months at MindPoint Group One of our employees, Mark Bolwell, or “Bolly” as he’s known, took the time to share with us his experience…
Read MoreCategories
- Access Control
- Application Security
- Architecture and Engineering
- Authentication
- Awareness and Training
- Blacklisting
- Breach
- Business Continuity
- Certification and Accreditation
- Cloud
- Compliance
- Configuration Management
- Continuous Monitoring
- Cyber Security
- Disaster Recovery
- Encryption
- Engineering and Architecture
- FedRAMP
- FISMA
- Full Disk Encryption
- Honeypot
- Information Leakage
- Insider Threat
- Insider Threat
- ISP Blog
- Mobile
- National Security
- Open Source
- Operations
- Organized Crime
- Passwords
- Pen Test
- Physical Security
- Policy and Procedure
- Privacy
- Program Management
- Qualitative Analysis
- Quantitative Analysis
- Risk Management and Assessment
- Security Appliance
- Security Monitoring Infrastructure
- Security Operations Center
- Social Engineering
- Trusted Platform Module
- Vulnerability Assessment
- Vulnerability Management and Assessment