Filter by Category

Introducing Kathryn Anderson from Backbone Consultants

July is fast approaching, and with it our latest webinar on cybersecurity, Lessons from the Field: 7 Steps to Proactive Cybersecurity. This engaging, hour long session will cover seven lessons organizations should use to build security awareness and protect sensitive company data.

Who’s speaking? Expect powerful discussion between Bob Erdman, Security Product Manager at HelpSystems, and a very exciting guest speaker—Kathryn Anderson of Backbone Consultants.

Meet Kathryn Anderson

Kathryn Anderson is a Senior Manager of IT Risk and Compliance. She comes to Backbone Consultants—and our webinar—with over a decade of relevant business and security knowledge.

As part of her role in IT Risk and Compliance at Backbone Consultants, she consults with businesses on needs they have and identifies security opportunities they may not realize they have. She helps them “understand what their risks are as an organization from a reputation standpoint, from a financial standpoint, from an operations standpoint, and find those opportunities they may not be looking at.” By studying the whole picture, she can give each company a complete overview of their institution and make suggestions for improvement.

We recently had the opportunity to sit down with Kathryn Anderson and learn about her background and security goals. “I started my career in Identity and Access Management. I fell into it and found, very quickly, that I absolutely loved it,” Anderson told us. “There are so many components of security that help organizations and their customers keep data safe, which is what attracted me to security as I delved into the Identity and Access Management part of it.”

Anderson’s first introduction to security was at TCF Bank, where she worked in an Identity and Access Management role doing user attestations and term and transfer lists. As her responsibilities evolved, she began to identify areas where the security department could use tools to automate business processes, like employee termination from central applications.

Finding these opportunities for improvement helped Anderson understand the importance of developing strong cybersecurity practices. “The purpose of this job really has a lot of value. If you have a system ID that’s just sitting out there and isn’t being used, and a terminated employee has access to some sort of information, it could put your data at risk. Understanding what security was helped elevate my career path,” she said.

After seven years at TCF Bank, Anderson accepted a position in Risk and Governance at General Mills, where she spent a majority of her time developing programs on Security Awareness and Third Party Vendor Assessment. She focused on security education, too, ensuring General Mills employees not only understood security best practices, but also felt empowered to protect data at work and at home.

Kathryn Anderson’s passion and interest in business security makes her a valuable guest speaker, and we’re excited to hear more from her in the upcoming weeks. She’ll also share her thoughts on the importance of proactive cybersecurity during our July 26 webinar. The event is open to everyone, but it should especially interest those who want to learn how to implement a security awareness program or manage resources in their organization.

About Backbone Consultants

Located in Minnesota, Backbone Consultants has provided clients with end to end cybersecurity services and compliance since 2008. Their services include IT audit and compliance, cybersecurity, data privacy, and technical training. Comprised of a strong professional team, Backbone Consultants work with companies to tackle business needs and identify areas of improvement in how they develop and manage their IT assets.

You can learn more about Backbone Consultants at their website.

Webinar Details

July 28 Update: Even though the webinar has passed, you don't have to miss out! Watch our on-demand webinar recording now.

Lessons from the Field: 7 Steps to Proactive Cybersecurity

Wednesday, July 26, 2017

11 am - 12 pm CT

Latest Posts


What is a DMZ and Why Do You Need a DMZ Gateway?

June 19, 2019

If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship…


Eight Hacks You Can Implement to Combat "Hackable" Network Vulnerabilities

June 18, 2019

Although we’re becoming savvier to the tricks hackers have pulled in the past, they are still working to up their game and catch us where and when we least expect it. Fortunately, there are some…


How to Achieve SFTP Automation in Your Organization

June 17, 2019

Whether you regularly receive 10 or 10,000 file transfers from your SFTP partners, it can be frustrating to go in and manually retrieve, unencrypt, and process these documents. Not only is this…


How SFTP Works

June 13, 2019

How does SFTP work?When you need to secure server-to-server file transfers between yourself, your trading partners, and enterprise servers, SFTP (which stands for SSH File Transfer Protocol or Secure…


Centralize Your EDI X12 File Translation with GoAnywhere MFT

June 3, 2019

GoAnywhere recently released a new version of its award-winning managed file transfer solution, GoAnywhere MFT. Version 6.1 includes support for electronic data interchange (EDI) X12 standards, as…