Back to Search Begin New Search Save Search Auto-Notify
Keep Device Data Safe with Secure Erase
Embedded devices today are used to store a wide variety of data. While some of that stored data is inherently secure – possibly through encryption or encoding – not all designs provide a secure data removal option. For magnetic media, the data must be both erased AND overwritten – only then is the data securely deleted from the drive. Is this sufficient or overkill for NAND media? In this webinar you will learn: The importanc...
December 12, 2022
Organizer: Tuxera
Location: Webcast
Add Favorite
Ransomware's Known (and Unknown) Risks
Ransomware has become a major threats to organizations of all types in recent years. And, the frequency and sophistication of attacks appears to breed a sense of inevitability that attacks will happen. Some cybersecurity leaders are resigned to a breach, and in turn, they report feeling less personally responsible if criminals succeed, as long as mitigation strategies were in place. However, no technology or ransomware protection strategy is c...
December 12, 2022
Organizer: Mimecast
Location: Webcast
Add Favorite
Detection Technique Deep Dive
Having detection techniques at hand – which you can apply in systematic approaches across different environments – is a ninja skill detection engineers and threat hunters need to have. In this session, Senior Threat Hunter Doug Brown will provide you with just that. Join Doug as he explores a range of concrete search techniques to measure a variety of behavioural changes, and demonstrates how to map those to MITRE ATT&CK techni...
December 12, 2022
Organizer: Splunk
Location: Webcast
Add Favorite
Adversaries, Weapons, & Countermeasures...
Recent cyberattacks in the headlines have hit multiple industries, have affected organisations of all sizes, serving as stark reminders that no one is safe. There is zero immunity from dedicated threat actors, and anyone operating in the digital space may be targeted next. With the rise of malicious hacking attempts occurring every 39 seconds, organisations will exhaust themselves relying on reactive security measures. Fortunately for CISO...
December 12, 2022
Organizer: Blackberry
Location: Webcast
Add Favorite
Fireside Chat with the Commander of the...
Col. Joseph L. Sheffield's 28th Bomb Wing at Ellsworth Air Force Base, S.D., sent B-1s to Andersen Air Force Base, Guam, on a Bomber Task Force mission recently. Learn the latest on "BONE" readiness, long-range strike, and more in this virtual fireside chat with AFA President-CEO Lt. Gen. Bruce Wright, USAF (Ret.).
December 11, 2022
Organizer: Air Force Association
Location: Virtual
Add Favorite
7th Annual Cyber Southwest Symposium
The National Defense Industrial Association (NDIA) - Southwest Chapter, the Arizona Cyber Threat Response Alliance (ACTRA), the AFCEA - Tucson Chapter, and the AZ Cyber Initiative will once again co-host the 7th Annual Cyber Southwest (CSW) set to take place on Friday, December 9, 2022. The event will take place The University of Arizona, Eller College of Management McClelland Hall - Berger Auditorium (2nd Floor), 1130 E. Helen St., Tucson, AZ...
December 9, 2022
Organizer: Secret Sauce Events (SSE)
Location: Tucson, AZ
Add Favorite
(ISC)2 SECURE Washington DC
This exciting one-day cybersecurity summit will bring information security professionals from around the capital together to explore the latest issues impacting government cybersecurity. You can expect to hear from thought leaders and top industry experts as they address Zero Trust, Cloud Security, Ransomware, and much more. Take back actionable ideas and strategies that help strengthen the security of your organization’s cyber operation...
December 9, 2022
Organizer: (ISC)²
Location: Washinton, DC
Add Favorite
ICS Consequence-Driven Incident Respons...
Consequences of modern cyber-attacks impacting control systems can range from large power grid blackouts to large cities or major regions, failure of critical manufacturing equipment with massive financial loss, paralyzing smart city infrastructure such as transportation in large municipalities, inflict serious environmental damage, or worse, cause injury or death to facility workers. The obvious choice for ICS security managers and technical...
December 9, 2022
Organizer: SANS Institute
Location: Webcast
Add Favorite
A Complimentary Webinar featuring Ed Zu...
Join us for a virtual retirement benefits webinar for Federal Government Employees. From a local “federal benefits guru,” Ed Zurndorfer- you will be learning about the mechanics and intricacies of the Federal Government’s benefits package for its employees. Most attendees say they wished they had come decades earlier, but it’s never too late to learn about the benefits that will support you in your retirement. The Virtu...
December 9, 2022
Organizer: Serving Those Who Serve
Location: Webcast
Add Favorite
Ask the Expert: The Gartner Top Strateg...
How do you keep pace with the constant change in today’s world, and ensure your technology remains up to the task? Innovation is mandatory today, and IT leaders need to determine which strategic technology trends could both create opportunity and drive significant disruption. Whether your enterprise needs to optimize its operations, scale its growth or pioneer new technology-led business models, you must act now or risk losing competitiv...
December 9, 2022
Organizer: Gartner
Location: Webcast
Add Favorite
Back to Search Begin New Search