48 past events found
+ 4 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
The Threat From the Internet – and What...
For most enterprises, the increasing use of the Internet has created new business opportunities, greater efficiencies, and a green field for innovation. But growing use of the Internet is also increasing the risk of cyber attack. In recent years, online attackers have launched a wide range of Internet-borne attacks, ranging from DDoS to DNS-based exploits to infiltration of commercial websites. And with the world relying more heavily on Web-ba...
June 30, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Preparing For, Detecting, and Managing...
There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable -- days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next. For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as...
June 17, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Building and Managing the Next-Generati...
No matter what your industry or what your organization’s size, there is a growing need to monitor your systems for potential threats – and have the capacity to respond quickly in the event of a compromise. To build out this capacity, many enterprises are building or expanding their security operations centers (SOCs) to improve their ability to detect and respond to cyber threats. In this webinar, experts offer insight and recommend...
June 10, 2020
Organizer: Informa
Location: Webcast
Add Favorite
Thinking Like an Attacker: Strategies f...
More and more, enterprises are discovering that the best way to test and defend their organization is to view their IT environment from the perspective of an attacker. But how do you predict an attacker's motives and simulate their methods, and how do you know that you aren’t overlooking key vulnerabilities? In this Dark Reading webinar, experts discuss methods for testing your security’s mettle by thinking like your adversary.
June 3, 2020
Organizer: Informa
Location: Webcast
Add Favorite
DOD Endpoint Security Summit
Join subject matter experts from across the DOD to discuss the latest developments in modernizing endpoint security! System administrators, analysts, program managers and experts from across the DOD user community will come together to discuss new capabilities planned, projected milestones, and the status and outcomes from rapid innovation fund projects and other endpoint security initiatives being evaluated by the military services. It will...
January 28-30, 2020
Organizer: Defense Information Systems Agency
Location: Fort Meade, MD
Add Favorite
Secure Delaware 2019
Delaware's 10th Annual Cyber Security Workshop will provide cyber security training for Delaware's citizens, business employees, students, and government employees. As an attendee of this event, you can expect to learn how to improve your odds of defending yourself, your family, your employer, your business, and the citizens of Delaware against cyber-attacks. This event provides the opportunity to share information and collaborate across all l...
September 24, 2019
Organizer: Delaware Department of Technology and Information
Location: Wilmington, DE
Add Favorite
DOD Endpoint Security Summit
DISA will host a no-cost Endpoint Security Summit Feb. 5-7 from 9 a.m. to 4 p.m. at its Fort Meade, Maryland, headquarters. The purpose of this event is to engage DOD endpoint security subject matter experts, system administrators, analysts, and users to update the DoD community on the current status of endpoint modernization efforts. This meeting of practitioners and subject matter experts will provide information regarding the status of end...
February 5-7, 2019
Organizer: Defense Information Systems Agency
Location: Fort Meade, MD
Add Favorite
How to Detect Cryptomining in your Envi...
Cryptominers are built to turn computing power into revenue. To make cryptomining a profitable venture, cyber criminals are writing and distributing malware to steal computing resources to mine for cryptocurrencies like Bitcoin and Monero by attacking victims' endpoints, public cloud accounts, and websites. Through various attack vectors, cyber attackers can turn compromised systems into a silent zombie army of cryptocurrency miners. Unless yo...
January 30, 2019
Organizer: Informa
Location: Webcast
Add Favorite
DISA Forecast to Industry 2018
The Defense Information Systems Agency’s (DISA) annual Forecast to Industry event will be held at the BWI Airport Marriott & Conference Center, in Linthicum, Maryland on Monday, Nov. 5, from 8 a.m.-4 p.m. The no-cost event will provide DISA’s industry partners with in-depth information about DISA's acquisition and procurement plans. Members of DISA's senior leadership will present briefings to address tactical acquisition issue...
November 5, 2018
Organizer: Defense Information Systems Agency
Location: Linthicum Heights, MD
Add Favorite
The Sky is Not Falling: Understanding t...
While most people are conditioned to see through the marketing hype surrounding “revolutionary!” and “game-changing!” new technologies, few have the same healthy skepticism when it comes to outsized claims about allegedly dire privacy risks that now routinely accompany many of the very same innovations. Taken at face value, these supposed privacy risks suggest that government should intervene to protect society. A close...
September 10, 2015
Organizer: Information Technology & Innovation Foundation
Location: Washington, DC
Add Favorite
Back to Search Begin New Search