There is a responsibility that comes with being a credible source of information. In cyber, being diplomatic about the dangers midmarket companies face can be a lie of omission that encourages complacency. My job is to make this issue easier to understand, not easier to swallow.

From the Battlefield to the Board Room
  
 
As a veteran of Desert Shield\Storm, Ken Barnhart earned his Combat Action Ribbon and other decorations serving with HQ Battalion, 2nd Marine Division.  Ken has carried forward his passion for the mission of protecting others from the battlefield to the board room. 
 
On the home front, Ken has successfully built and sold multiple IT businesses with the belief that technology holds the power to educate, empower and protect.  Through the years he’s consulted for the enterprise elite, designing, building and securing their global cloud and hybrid infrastructures.
Ken red blue.svg
Ken Barnhart
thin red line.png
Highground Cyber's Founder and CEO
As a Philanthropist and a strong advocate for Veterans, Ken is an active supporter of the Wounded Warrior Project and has worked closely with the Minnesota Voice of the Veteran Program as well as the Brothers in Blue Prison Ministry.
 
The Marine credo “no man left behind” reverberates in Ken’s personal mission of security – to awaken, empower and preserve fellow CEOs in the small and mid market ecosystem that are now on the front lines of this sinister new battlefield of cybersecurity.  This subject of protecting our nation’s smb ecosystem is rooted in his deep appreciation for business and the risk the owners and CEOs take to stake their reputations, retirements and financial assets to provide 50% of our nation’s payroll.    These businesses and their leadership are worth our very best effort.     -Semper Fi.
  • testi1.png
  • testi2.png
  • testi3.png
  • testi4.png

 

MOVING CYBERSECURITY FROM THE HEADLINES TO THE EXECUTIVE HEADSPACE.
Abdication is no longer an option and hope is not a strategy.” 
 
According to Department of Homeland Security statistics 97% of the financial losses related to Cybercrime are occurring in small and mid-market organizations. Yet, In a recent survey, 82% of mid-market executives stated that they don’t believe they are a target, claimed they haven’t been hacked, or asserted that Cyber Security is exclusively a large organization  problem. Clearly this perception is not matching reality. This program will move CyberSecurity from the Headlines to the Headspace of the mid-market C-Suite by focusing on c-suite business issues instead of technical matters.
THE NOTORIOUS 9: FACTORING THE FACTS
If you have ever struggled to determine how much and where you should be spending on your cyber security program, this session is for you.

In this session, Ken will outline the “Notorious Nine” risk factors using common business & financial metrics.  More specifically, from the perspective of customer segments, revenue streams, the balance sheet and the importance of your company’s brand.  This is an asset based approach derived from multidisciplinary research on how asset types are compromised.