24 past events found
Back to Search Begin New Search Save Search Auto-Notify
ISMG Roundtable Dinner- Secure Your Ide...
Insider threats are back and broader than ever – growing more than 44% over just the past two years. Once manifesting mainly as malicious attacks against an organization, insider threats now are commonly the result of accidents or external compromise. And just as commonly, these threats prey upon access to your critical systems and data. Which are the predominant insider threats against your organization? How are they picking away at yo...
February 20, 2024
Organizer: Information Security Media Group (ISMG)
Location: Washington, DC
Add Favorite
DISA Director's Engagement with Industry
The Defense Information Systems Agency presents a special event to facilitate expanded engagement with industry. Members of industry are invited to join Air Force Lt. Gen. Robert J. Skinner, DISA director and JFHQ-DODIN commander, for a focused discussion on the agency’s Strategic Plan Lines of Effort, and the agency defined challenges in meeting strategic objectives in support of the warfighter. This session’s topic is Line of Eff...
September 29, 2022
Organizer: Defense Information Systems Agency (DISA)
Location: Virtual
Add Favorite
Black Hat USA 2021
Now in its 24th year, Black Hat USA is excited to present a unique hybrid event experience, offering the cybersecurity community a choice in how they wish to participate. Black Hat USA 2021 will open with four days of Virtual Trainings (July 31-August 3) conducted in real-time online, with all instructors accessible throughout each class. The two-day main conference (August 4-5) featuring Briefings, Arsenal, Business Hall, and more will be a h...
July 31 - August 5, 2021
Organizer: Informa
Location: Las Vegas, NV
Add Favorite
How to Become a VAULTIS-Compliant, Miss...
Quality operational data provides the overmatch needed to take data to the valued asset level so that the US DoD remains #1. The Department of Defense has mandated all DoD leaders “treat data as a weapon system and manage, secure, and use data for operational effect.” To achieve this mandate, the DoD Data Strategy lays out seven goals to transition towards data-centric operations: VAULTIS, to make data Visible, Accessible, Understa...
June 10, 2021
Organizer: Informatica Government Team at Carahsoft
Location: Webcast
Add Favorite
Now That Ransomware Has Gone Nuclear, H...
There is a reason more than half of today’s ransomware victims end up paying the ransom. Cyber-criminals have become thoughtful; taking time to maximize your organization’s potential damage and their payoff. After achieving root access, the bad guys explore your network reading email, finding data troves and once they know you, they craft a plan to cause the most panic, pain, and operational disruption. Ransomware has gone nuclear....
August 18, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Securing Active Directory the Way it Deserves
Credential theft and lateral movement are now regular, everyday tricks of the cyber attacker trade. So it’s imperative that every business secure the foundations of its enterprise access control system: Active Directory. And yet, for many organizations, Active Directory management and security is a major challenge, and they don’t know where to begin. In this webinar, experts will explain the latest AD-related threats and help you g...
August 11, 2020
Organizer: Informa
Location: Webcast
Add Favorite
The Threat From the Internet – and What...
For most enterprises, the increasing use of the Internet has created new business opportunities, greater efficiencies, and a green field for innovation. But growing use of the Internet is also increasing the risk of cyber attack. In recent years, online attackers have launched a wide range of Internet-borne attacks, ranging from DDoS to DNS-based exploits to infiltration of commercial websites. And with the world relying more heavily on Web-ba...
June 30, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Preparing For, Detecting, and Managing...
There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next. For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as...
June 17, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Building and Managing the Next-Generati...
No matter what your industry or what your organization’s size, there is a growing need to monitor your systems for potential threats – and have the capacity to respond quickly in the event of a compromise. To build out this capacity, many enterprises are building or expanding their security operations centers (SOCs) to improve their ability to detect and respond to cyber threats. In this webinar, experts offer insight and recommend...
June 10, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Thinking Like an Attacker: Strategies f...
More and more, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.
June 3, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Back to Search Begin New Search