Identity Management for a Dynamic Workf...
User working patterns have completely turned upside down within the last six months. Recently, most organisations have adopted remote working, collaboration tools, cloud storage and applications into their critical business processes. Let’s address the elephant in the room: how can businesses securely facilitate access to these applications, data stores, devices and tools? In this webinar, a panel of security experts will discuss Zero Tr...
Building a Diverse, Skilled and Evolved...
In the fast-paced and data-driven modern landscape, a key element of a team’s success requires several layers of diversity – from thought to skill level, through to past experiences and future ambitions. Effective security teams are those built with diverse groups of highly-skilled specialists and broadly-adept generalists. While traditionally organisations have opted to create a list of required security specialities and then trie...
Key Technologies, Strategies and Tactic...
The global pandemic has seen phishers jump on the COVID-19 trend, and as a result the quantity of phishing messages related to the virus has spiked over the last few months. As well as phishing messages that try to download malware via lures of official documents, the standard practise of trying to a victim’s password and financial details remain. However as we have seen an increase in the types of phishing, to include more targeted effo...
Using a Managed Security Service Provid...
Despite the maturity of the managed security services provider (MSSP) market, security professionals and vendors often fail to sync up as true, successful partners. Whilst the role of the MSSP has been called into use in recent months as a result of managed services being required for a largely remote workforce, the MSSP is also needed when a company has weaknesses in its defense. In this webinar, we will consider how MSSP relationships work,...
InfoSecurity North America Expo and Con...
In November 2019, Infosecurity North America and ISACA will align in the field of security, cybersecurity and risk management to create an incredible experience for attendees in programming, solutions and networking. Join us for the next evolution of ISACA’s CSX North America Conference and Reed Exhibition’s Infosecurity North America event for an experience like no other. This combined conference brings together our expertise, key...
November 20-21, 2019
Organizer:
ISACA Location:
New York, NY
GRRCON 2019
GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people. We keep GrrCON small with around 1,700 attendance to allow us to provide those things other events leave out. Whether you are a Fortune 500 executive, security researcher, industry professional, student, or a hacker of “flexible” morals you will find somethin...
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
Webcast: Creating a Culture of Security...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
Malware, Crimeware and Phishing - In De...
Webcast: The evolution of malware and crimeware has produced more insidious and harmful intrusions to networks and systems. This webinar will show how these types of intrusions relate to phishing and will help put current attacks into perspective and help organizations anticipate likely trends. The webinar will also describe the different ways by which clients may be attacked, and their machines may become infected. While many of these threats...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.