Back to Search Begin New Search Save Search Auto-Notify

Upcoming Events

Past Events

Agency + Refine Your Search

Organizer + Refine Your Search

Focus + Refine Your Search

Category + Refine Your Search

Back to search

Professionalization and the Cybersecuri...
The increasing frequency and scale of reported cyber attacks, highlights the need for a cybersecurity workforce of sufficient size and quality to meet the evolving threat environment. To address this need, some cybersecurity experts call for enhanced professionalization requirements. Certification, licensure, skill-based competency exams, and a national association all have been advanced as components of a comprehensive workforce strategy to a...
Add Favorite
Stop Issuing Secure Credentials to Imposters
Much has been said about the difficulties in screening persons for possible imposter fraud or security concerns based upon use of current identity documents like birth certificates, driver’s licenses or passports. The most often reasons given are the lack of standardization of security features and the layout for these documents. This criticism is focused on the inability of even a trained person to recognize valid documents and the spec...
Add Favorite
Proactive Cyber Deterrance
Cyber risk is a product of threats, vulnerabilities and consequences. Driving any one of these to zero, will achieve zero risk. Most of us do not have a James Bond 007 license and thus cannot eliminate threats. For some time the general belief has been that all vulnerabilities can be eliminated, thus driving cyber risk to zero. Are there any CISOs who are telling their CEOs that all vulnerabilities are eliminated? Detection is a much more diff...
Add Favorite
"Women in Security: Building for the Future"
It’s no secret that the information security profession is lacking female minds. In fact, the 2015 (ISC)2 Global Information Security Workforce Studies study shows that women represent only 10% of the industry. Awareness is certainly improving, as evidenced by a recent increase in women-focused professional events. Yet, as the (ISC)2 studies have shown, the proportion of women to men has been stubbornly stagnant. The number of women in i...
Add Favorite
Introduction to Peach Fuzzer and Fuzzin...
An on-demand webinar that introduces Peach Fuzzer and overviews our fuzzing technology. Peach Fuzzer is an automated security testing platform that finds unknown vulnerabilities in software & hardware systems, IoT & embedded devices. We help identify unknown vulnerabilities so you can close them and help prevent zero-day attacks.
Add Favorite
Share Files Securely - Learn from the C...
Does your organization struggle to send large files, manage a complex system of content stored in multiple locations, and securely collaborate with outside parties on confidential documents?The City of Pleasanton faced these challenges and more, but Allen Hammond, Director of Information Technology for the City of Pleasanton, found and implemented a solution. Join Allen for this on-demand webinar as he discusses how the City of Pleasanton: Co...
Add Favorite
Leading Government Transformation: 8 Cr...
Even in the face of radical change, breakthroughs are possible for the thriving of the planet and all people. This free webinar is specifically designed for leaders in government: departments, bodies, institutions, agencies at federal, state / provincial, regional and municipal levels. Managers, Directors, Deputy Ministers/secretaries are invited to grasp the breadth and depth of transformational possibility. Which key paradigms must governme...
Add Favorite
Back to Search Begin New Search