Back to Search Begin New Search Save Search Auto-Notify
Identity Management for a Dynamic Workf...
User working patterns have completely turned upside down within the last six months. Recently, most organisations have adopted remote working, collaboration tools, cloud storage and applications into their critical business processes. Let’s address the elephant in the room: how can businesses securely facilitate access to these applications, data stores, devices and tools? In this webinar, a panel of security experts will discuss Zero Tr...
August 27, 2020
Organizer: INFOSECURITY GROUP
Location: Webcast
Add Favorite
Building a Diverse, Skilled and Evolved...
In the fast-paced and data-driven modern landscape, a key element of a team’s success requires several layers of diversity – from thought to skill level, through to past experiences and future ambitions. Effective security teams are those built with diverse groups of highly-skilled specialists and broadly-adept generalists. While traditionally organisations have opted to create a list of required security specialities and then trie...
August 20, 2020
Organizer: INFOSECURITY GROUP
Location: Webcast
Add Favorite
Key Technologies, Strategies and Tactic...
The global pandemic has seen phishers jump on the COVID-19 trend, and as a result the quantity of phishing messages related to the virus has spiked over the last few months. As well as phishing messages that try to download malware via lures of official documents, the standard practise of trying to a victim’s password and financial details remain. However as we have seen an increase in the types of phishing, to include more targeted effo...
August 6, 2020
Organizer: INFOSECURITY GROUP
Location: Webcast
Add Favorite
Using a Managed Security Service Provid...
Despite the maturity of the managed security services provider (MSSP) market, security professionals and vendors often fail to sync up as true, successful partners. Whilst the role of the MSSP has been called into use in recent months as a result of managed services being required for a largely remote workforce, the MSSP is also needed when a company has weaknesses in its defense. In this webinar, we will consider how MSSP relationships work,...
August 4, 2020
Organizer: INFOSECURITY GROUP
Location: Webcast
Add Favorite
InfoSecurity North America Expo and Con...
In November 2019, Infosecurity North America and ISACA will align in the field of security, cybersecurity and risk management to create an incredible experience for attendees in programming, solutions and networking. Join us for the next evolution of ISACA’s CSX North America Conference and Reed Exhibition’s Infosecurity North America event for an experience like no other. This combined conference brings together our expertise, key...
November 20-21, 2019
Organizer: ISACA
Location: New York, NY
Add Favorite
GRRCON 2019
GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people. We keep GrrCON small with around 1,700 attendance to allow us to provide those things other events leave out. Whether you are a Fortune 500 executive, security researcher, industry professional, student, or a hacker of “flexible” morals you will find somethin...
October 24-25, 2019
Organizer: MidWest InfoSec, LLC
Location: Grand Rapids, MI
Add Favorite
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
January 26, 2010
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
January 11, 2010
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Webcast: Creating a Culture of Security...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
December 17, 2009
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Malware, Crimeware and Phishing - In De...
Webcast: The evolution of malware and crimeware has produced more insidious and harmful intrusions to networks and systems. This webinar will show how these types of intrusions relate to phishing and will help put current attacks into perspective and help organizations anticipate likely trends. The webinar will also describe the different ways by which clients may be attacked, and their machines may become infected. While many of these threats...
December 14, 2009
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Back to Search Begin New Search