Back to Search Begin New Search Save Search Auto-Notify

View Full Calendar

On-Demand Webcasts

Past Events

Location + Refine Your Search

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

SANS@MIC - Remote Forensic Investigatio...
Many of us are confined at home due to the COVID-19 pandemic. But, business as usual, many organizations are still facing security incidents (related to the virus or not). Let's imagine the following scenario: Your phone rings because a customer detected some suspicious activity on a server or a workstation. Of course, it must be investigated "as soon as possible". The server is physically located 500km away and you're stuck at home... How to...
August 10, 2020
Organizer: SANS
Location: Webcast
Add Favorite
SANS@MIC -Large Scale Honeypotting: The...
Honeypots have always been a favorite of researchers. But making them scale and automating the operation of large "fleet" of honeypots operated by volunteers has been challenging. In this talk, you will get a brief tour of the infrastructure behind the SANS Internet Storm Center. You will learn how some of the recent attacks we detected and wrote about were picked up and analyzed by this global network of honeypots. We will look at live data,...
August 10, 2020
Organizer: SANS
Location: Webcast
Add Favorite
Cloud Security Alliance | CCSK Foundati...
The Certificate of Cloud Security Knowledge (CCSK) Training Program is designed to ensure that a broad range of professionals with a responsibility related to cloud computing have a demonstrated awareness of the security threats and best practices for securing the cloud. Intrinsec’s 2 DAY Official CCSK Foundation lecture will help you successfully prepare for the Certificate of Cloud Security Knowledge (CCSK) exam. Our authorized instruc...
August 10-11, 2020
Organizer: Intrinsec Security
Location: Virtual
Add Favorite
32nd Annual Crimes Against Children Con...
To protect the health and safety of attendees, this event has been moved to online-only due to COVID-19 concerns. Internationally recognized, the Crimes Against Children Conference is the premier conference of its kind providing practical and interactive instruction to those fighting crimes against children and helping children heal. The conference is presented annually by the Dallas Children's Advocacy Center. The conference is conducted to p...
August 10-13, 2020
Organizer: Dallas Children's Advocacy Center
Location: Virtual
Add Favorite
IT Security in Emerging Technology
As federal agencies adopt emerging technologies such as Fifth-Generation Wireless Technology (5G), Artificial Intelligence (AI), the Internet of Things (IoT), and Cloud, they face new challenges in ensuring these technologies can operate securely on their networks. Join the next event in GSA’s Information Technology Category - Emerging Technology Series. This virtual event will bring together government IT security experts to share knowl...
August 11, 2020
Organizer: General Services Administration
Location: Virtual
Add Favorite
All Clearances or Cyber Virtual Job Fair
Security-cleared professionals and cyber security professionals meet with leading employers at the San Antonio All Clearances or Cyber Virtual Job Fair, Tuesday, August 11, from 2pm - 5pm CDT. Accenture Federal Services, Air Force Civilian Service, Applied Research Associates (ARA), Idaho National Laboratory, Leidos, Novetta, Silotech Group, SOSi and more to come! Whether you’re between contracts, transitioning out of the military / gove...
August 11, 2020
Organizer: ClearedJobs.Net
Location: San Antonio, TX
Add Favorite
FCW Workshop: Cybersecurity
Fending off cyber threats and preserving cybersecurity has never been more challenging. Among federal, state and local executives, cybersecurity consistently tops the list of concerns that keep them up at night. Attack surfaces are larger; the universe of bad actors seeking to breach security is expanding; techniques for exploiting vulnerabilities are more sophisticated; and in a digitally transformed environment, the stakes are higher, as wel...
August 11, 2020
Organizer: 1105 Public Sector Media Group
Location: Virtual
Add Favorite
Securing Active Directory the Way it Deserves
Credential theft and lateral movement are now regular, everyday tricks of the cyber attacker trade. So it’s imperative that every business secure the foundations of its enterprise access control system: Active Directory. And yet, for many organizations, Active Directory management and security is a major challenge, and they don’t know where to begin. In this webinar, experts will explain the latest AD-related threats and help you g...
August 11, 2020
Organizer: Informa
Location: Webcast
Add Favorite
The Evolution of Data Protection: From...
Tired of periodic backups that don’t meet the availability demands of your agency? Worried about recovering quickly from an outage or ransomware? Concerned about your ability to prove you can recover during annual compliance audits? It’s time to rethink your backup strategy with continuous data protection. Join this webinar to learn how Zerto can help you execute your day-to-day data protection strategy and streamline the number of...
August 11, 2020
Organizer: Signal
Location: Webcast
Add Favorite
Mastering Cybersecurity Asset Managemen...
Understanding your assets is the foundation of cybersecurity, right? So then why is asset management still such a monster of a problem? As IT environments become increasingly complex, teams are struggling to keep up. We are spending millions of dollars on security solutions, but we cannot even validate that they are deployed and functioning like they ought to. It is a nightmare...but it does not have to be. Join us for Mastering Cybersecurity...
August 11, 2020
Organizer: ISACA
Location: Webcast
Add Favorite
Back to Search Begin New Search