CompTIA Security+ Training Boot Camp
CompTIA’s Security+ certification is the most popular cybersecurity certification in the world. It validates entry-level competencies and on-the-job skills across core security functions, and it is frequently requested in cybersecurity job descriptions. With this certification, you can support your organization in various roles to identify potential security threats, improve incident response and more. What will Security+ certification d...
June 17-21, 2024
Organizer:
Infosec Location:
Virtual
AT&T LevelBlue
Join LevelBlue's (AT&T's former cybersecurity services division) top cyber field advisor, Keith Thomas, Rick Doten, VP, CISO, Healthcare Enterprises and International, Centene Corporation, and Allan Hise, Director of Systems, Fortinet to learn the top five most effective actions to take in 2024 for improving your organization’s cyber resilience in the cloud. We’re hosting an engaging cyber networking event and discussions with...
Automation as a Cybersecurity Resource
Government agencies at all levels face cyber threats at an increasing rate. Ransomware attacks alone increased by 70% year over year in 2023. Yet agencies are constrained by budget limitations and the shortage of cybersecurity professionals, leading to trying to manage from crisis to crisis and never catching up. Automating security workflows can help agencies get a handle on their challenges and prioritize their security needs, but it isn...
June 20, 2024
Organizer:
FedInsider Location:
Webcast
Approach Cybersecurity as a Business In...
Cost and value are the levers driving all business outcomes with the exception of cybersecurity, until now. Executive boards want cybersecurity managed like other business risks. Measuring cybersecurity value delivery and establishing a standard of care accrues benefits, shifting the landscape in cybersecurity investment. Security and risk leaders must be able to communicate the risks, value and cost of cybersecurity to their board of director...
June 20, 2024
Organizer:
Gartner Location:
Webcast
Security Operations Summit
From a constantly evolving threat landscape and expanding attack surface to a significant shortage of skilled professionals, many security teams face serious challenges. Today’s cybersecurity threats are more sophisticated and pervasive, and threat actors typically have plenty of time to achieve their objectives, particularly now with AI-driven tools at their disposal. With AI, threat actors have another “easy” button for car...
June 18, 2024
Organizer:
Fortinet Location:
Webcast
Decoding Digitalization Defense: Friend...
The adoption and implementation of digitalisation is well underway in most of society, with defence organisations at various stages of the transition. However, are any of them losing out due to the speed of adoption? Given the “new normal” in warfare we are witnessing in Ukraine, what is their plan to create and maintain information superiority without digitalisation? Defence agencies’ traditional working practices are battle...
Engineering Cybersecurity Mitigations f...
Large water utilities are looking to gain efficiencies by adopting new distributed edge devices and digital transformation initiatives incorporating the latest machine learning and AI algorithms. Meanwhile, small to mid-size municipalities, are wanting to maintain their reliability without increasing their rate-base. Yet, a worsening threat environment looms over North American and European operators. Increasingly sophisticated criminal ransom...
Securing Our Schools: A Fireside Chat o...
Join the K12 Security Information eXchange (K12 SIX) and ThreatDown for a fireside chat with Cybersecurity Evangelist Mark Stockley as we tackle the alarming rise of ransomware attacks in schools. With a staggering 92% increase in K-12 and a 70% jump in Higher Education, educational institutions are prime targets. Mark will pull back the curtain on the top 3 ransomware trends, busting the myth of just stopping malware. We'll delve into a new w...
June 18, 2024
Organizer:
K12 Six Location:
Webcast
How to Defend Your Expanding Attack Surface
There are plenty of benefits to innovative new technologies, from greater efficiency to cost savings to customer satisfaction. It is rare, however, for a new technology to truly replace existing IT – rather, it gets incorporated into or bolted onto current systems. This approach, along with the explosion of mobile devices and proliferation of software and SaaS applications, dramatically increases and clouds an Agency’s cyber footpr...
June 18, 2024
Organizer:
FedInsider Location:
Webcast
Industrial Control Systems Summit Solut...
Adversaries targeting critical infrastructure systems (power grids, water management systems, heavy manufacturing, oil and gas refineries and pipelines, etc.) have demonstrated detail technical knowledge of control system components, industrial protocols, and engineering operations. These skilled and brazen adversaries continue to launch a combination or Ransomware and targeted ICS tailored attacks against the safety and reliability of critica...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.