Orange County Cybersecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
June 27, 2024
Organizer:
FutureCon Location:
Orange County, CA
Haystack CTF: The Hunt for IOC's
Immerse yourself in the world of Intrusion Detection in our new Blue Team game, Haystack. Your mission is to follow the trail of Indicators of Compromise (IOCs) and spot the tell-tale signs of cyber threats. It's a mix of fun, challenge, and learning - an experience you don't want to miss! An up-and-coming hacker prodigy known as Leopold falls into debt with The League after unsuccessfully trying to hack into The League's network to exploit th...
Maximum ACFR Automation for States, Lar...
Join Workiva on June 27th, to learn why and how the largest, most complex public sector organizations are leveraging technology to drive efficiency —automating journal entries, GAAP/Closing packages, GASB 87/96/94, and reducing ACFR preparation time by 50+ percent. During this webinar, attendees will: Learn why these organizations are prioritizing productivity improvement for their finance teams. Discover how collecting, compiling, and a...
Is Access to Corporate Resources from a...
In today's dynamic digital landscape, the need for secure and seamless access to corporate resources from any device, anywhere is paramount. Join SANS Senior Instructor Dave Shackleford and HPE’s Darren Tidwell for an insightful webcast where we dive into the modern threats and security challenges that organizations face, and how innovative solutions like SSE from HPE address these challenges head-on. HPE Aruba Networking SSE securely co...
DigiMarCon America 2024
DigiMarCon America 2024 is your chance to ... Hear from some of the most audacious and thought-provoking speakers in the digital marketing, media and advertising industry. Gain insight into emerging strategies, the latest innovative technologies, and best practices to move your business to the next level. Network with thought leaders, reunite with your peers, and build your professional network. The 3rd annual DigiMarCon America, the Premier D...
OASIS CPRM Vouchers and CAF Remittance
This training class focuses on the process for submitting CAF vouchers in CPRM and remitting CAF payments. Analysts will be on hand to answer your questions. Failure to ensure the Contract Access Fee (CAF) is appropriately included in all task order solicitation responses and subsequent task order awards, on a separate line item, may lead to contract non-compliance. It is critical to ensure CAF is paid to you by ordering contracting offices, s...
Electric Vehicles, Charging Station Inf...
Concern for the environment and a move away from fossil fuels has supercharged the growth of the electric vehicle market. While in many ways this is a sign of progress, the explosion of electric transport has placed new demands on local infrastructure and created new security risks. The digitization of a previously analog process has opened the door to a new kind of cyber crime, which in turn has prompted a new kind of cyber security. What doe...
Practical Threat Modeling Based on Comm...
Every organization professes that risk management is at the heart of its cybersecurity program. Threat modeling is at the heart of this proactive approach: a systematic process that helps organizations identify, understand, and mitigate potential threats. However, with technology's ongoing advancement and the rising complexity of digital systems, constructing exhaustive threat models from the ground up can be daunting. In this presentation, Ja...
Beyond the Horizon: Use AI to Expand Th...
In the rapidly evolving landscape of cybersecurity, the ability to effectively detect and respond to threats is paramount for organizations across the globe. Traditional threat intelligence mechanisms have often been reactive, focused on addressing vulnerabilities after they have been exploited. However, with the increasing sophistication of cyber threats and the expanding digital footprint of modern enterprises, there is a critical need to pi...
Continuous Attack Surface Discovery and...
As the nature of our technology landscape changes more and more frequently, it’s challenging for many security operations teams to keep pace with the current threat surface we have on the internet, as well as the state of vulnerabilities and risks associated with these assets. Many security teams are performing vulnerability and web application scanning in a relatively ad hoc manner, and don’t truly have a continuous view of what e...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.