Filter by Category

Introducing Kathryn Anderson from Backbone Consultants

July is fast approaching, and with it our latest webinar on cybersecurity, Lessons from the Field: 7 Steps to Proactive Cybersecurity. This engaging, hour long session will cover seven lessons organizations should use to build security awareness and protect sensitive company data.

Who’s speaking? Expect powerful discussion between Bob Erdman, Security Product Manager at HelpSystems, and a very exciting guest speaker—Kathryn Anderson of Backbone Consultants.

Meet Kathryn Anderson

Kathryn Anderson is a Senior Manager of IT Risk and Compliance. She comes to Backbone Consultants—and our webinar—with over a decade of relevant business and security knowledge.

As part of her role in IT Risk and Compliance at Backbone Consultants, she consults with businesses on needs they have and identifies security opportunities they may not realize they have. She helps them “understand what their risks are as an organization from a reputation standpoint, from a financial standpoint, from an operations standpoint, and find those opportunities they may not be looking at.” By studying the whole picture, she can give each company a complete overview of their institution and make suggestions for improvement.

We recently had the opportunity to sit down with Kathryn Anderson and learn about her background and security goals. “I started my career in Identity and Access Management. I fell into it and found, very quickly, that I absolutely loved it,” Anderson told us. “There are so many components of security that help organizations and their customers keep data safe, which is what attracted me to security as I delved into the Identity and Access Management part of it.”

Anderson’s first introduction to security was at TCF Bank, where she worked in an Identity and Access Management role doing user attestations and term and transfer lists. As her responsibilities evolved, she began to identify areas where the security department could use tools to automate business processes, like employee termination from central applications.

Finding these opportunities for improvement helped Anderson understand the importance of developing strong cybersecurity practices. “The purpose of this job really has a lot of value. If you have a system ID that’s just sitting out there and isn’t being used, and a terminated employee has access to some sort of information, it could put your data at risk. Understanding what security was helped elevate my career path,” she said.

After seven years at TCF Bank, Anderson accepted a position in Risk and Governance at General Mills, where she spent a majority of her time developing programs on Security Awareness and Third Party Vendor Assessment. She focused on security education, too, ensuring General Mills employees not only understood security best practices, but also felt empowered to protect data at work and at home.

Kathryn Anderson’s passion and interest in business security makes her a valuable guest speaker, and we’re excited to hear more from her in the upcoming weeks. She’ll also share her thoughts on the importance of proactive cybersecurity during our July 26 webinar. The event is open to everyone, but it should especially interest those who want to learn how to implement a security awareness program or manage resources in their organization.

About Backbone Consultants

Located in Minnesota, Backbone Consultants has provided clients with end to end cybersecurity services and compliance since 2008. Their services include IT audit and compliance, cybersecurity, data privacy, and technical training. Comprised of a strong professional team, Backbone Consultants work with companies to tackle business needs and identify areas of improvement in how they develop and manage their IT assets.

You can learn more about Backbone Consultants at their website.

Webinar Details

July 28 Update: Even though the webinar has passed, you don't have to miss out! Watch our on-demand webinar recording now.

Lessons from the Field: 7 Steps to Proactive Cybersecurity

Wednesday, July 26, 2017

11 am - 12 pm CT

Latest Posts


iPaaS and MFT: What You Need to Know

September 24, 2020

Once upon a time, you carried an MP3 player to listen to music, a cell phone to text and make calls, and a book if you wanted to read. Video games and the internet? Best to use your preferred gaming…


What is Electronic File Transfer?

September 22, 2020

Meet Electronic File Transfer If your IT department is still relying on outdated methods like FTP, PC tools, or legacy scripts to meet your organization’s data transfer needs, now is the time to…


What is a Cloud Connector?

September 17, 2020

The cloud and all its possibilities for connecting with customers, vendors, trading partners, and more is exciting. Managing your organization’s transition to the cloud – whether you’re…


How Amazon Web Services Works with GoAnywhere MFT

September 16, 2020

“Alexa, What is MFT?” While that may not be a question you’ve ever asked your virtual assistant, it’s not outside the realm of possibility – Amazon has quickly become ubiquitous for online…


Why You Should Use Scheduled File Transfer Software

September 15, 2020

Have you set up Amazon auto-deliveries? Installed a smart thermostat to keep your house the perfect temperature throughout the day? Approved auto-pay for your bills? Today’s world makes it easy to…