NEWS

   

EVENTS

Conferences

Cyber Security Leaders Exchange 2020

CYBER SECURITY LEADERS EXCHANGE 2020

August 10-12, 2020
Strategies and peer led insights to address the operational risks, workforce challenges and technology decisions faced by cyber security leaders from top tier Australasian organisations.

The 29th USENIX Security Symposium

THE 29TH USENIX SECURITY SYMPOSIUM

August 12-14, 2020
Sponsorship exposes your brand to highly qualified attendees, funds our diversity and student grants, supports open access to our conference content, and keeps USENIX conferences affordable. USENIX is a 501(c)(3) non-profit organization that relies on sponsor support to fulfill its mission. To learn...

International Cryptographic Module Conference

INTERNATIONAL CRYPTOGRAPHIC MODULE CONFERENCE

August 25-28, 2020
The coming year will see widespread changes in commercial cryptography: The highly-anticipated FIPS 140-3 standard for cryptographic modules becomes effective in late 2020. At the same time, European regulators are moving forward with independent cryptographic standards. Interest in open source solu...

Techno Security & Digital Forensics Conference 2020

TECHNO SECURITY & DIGITAL FORENSICS CONFERENCE 2020

September 14-17, 2020
Comexposium is one of the world’s leading event organizers. Globally, it hosts more than 135 B2B and B2B2C events across many different sectors, significantly in agriculture, construction, fashion, food, health, leisure, real estate, retail, security, students, tourism, etc. At events, in over...

23rd Black Hat USA Conference

23RD BLACK HAT USA CONFERENCE

August 01-06, 2020
Now in its 23rd year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2020 opens with four days of technical Trainings (August 1-4) followed by the two-day main conference (August 5-6) fe...

The 7th annual SANS Security Awareness Summit

THE 7TH ANNUAL SANS SECURITY AWARENESS SUMMIT

August 05-06, 2020
The 7th annual SANS Security Awareness Summit is on and we're getting ready for our biggest and best Summit yet! Every year, we strive to provide the very best forum for security awareness officers looking to take their program to the next level! Our promise is to provide actionable lessons you ...

WASHINGTON DC CYBERSECURITY CONFERENCE

WASHINGTON DC CYBERSECURITY CONFERENCE

July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...

The RSA Conference 2020

THE RSA CONFERENCE 2020

July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

 

Webinars

AUG 13, 2020
HOW TO MITIGATE YOUR CYBER RISK IN THE NEW NORMAL
Exposure to cyber-attacks and disruption to systems have been leading concerns for businesses in recent years and those risks are heightened as we come to grips with COVID-19. We have never been more reliant on technology and never more exposed to cyber risk, particularly as we see a surge...
AUG 19, 2020 | 1:00 PM
REAL-WORLD USE CASES OF METRICS THAT DEMONSTRATE EFFECTIVE SECURITY PRACTICES
This webcast takes a deeper dive into the topics explored in the SANS 2020 Metrics Survey to detail real-world use case examples of businesses selecting and using security metrics. Each speaker will detail a customer example of security metrics that helped reduce the risks posed by use of ...
AUG 25, 2020
MONITORING CYBERTHREATS FOR A REMOTE WORKPLACE
As a result of COVID-19, organizations around the globe have instituted remote work policies on a massive scale. Now more than ever, critical IT infrastructure must remain available to ensure remote access to internal resources and services. Businesses enabling their remote workers may be ...
AUG 25, 2020
WHY CYBER CRIMINALS HOPE THAT NO ONE IS MANAGING YOUR CYBER SECURITY
Join Terry McGraw, President of PC Matic Federal and Greg Scasny, CTO of Cigent, as they discuss why the number of sophisticated cyber-attacks on small and medium sized organizations is on the rise and how to protect your organization: Why effective network and endpoint security is no long...
SEP 02, 2020 | 3:00 pm
THREAT HORIZON 2022: DIGITAL AND PHYSICAL WORLDS COLLIDE
The digital and physical worlds are on an irreversible collision course. By 2022, organisations will be plunged into crisis as ruthless attackers exploit weaknesses in immature technologies and take advantage of an unprepared workforce. At the same time, natural forces will ravage infrastr...

CREATING A MODERN IDENTITY STRATEGY FOR HYBRID IT ENVIRONMENTS
Sponsored
The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-t...
FOCUS ON OPEN SOURCE COMPLIANCE AND SECURITY DURING LEGAL TRANSACTIONSENABLE GINGER
Data points to the fact that companies have difficulty managing third-party open source within their software code bases, leading to compliance, IP, and security risk. These risks are often amplified in legal transactions and can impact “go”/”no go” decisions if not addressed throughout th...
YOUR CODE ISN’T STATIC YOUR PROCESSES SHOULDN’T BE EITHER
The only thing constant is change, and change requires oversight and very possibly an overhaul of your processes to support any shifts. The open source world is not exempt. Net, your code isn't static so your processes shouldn't be either. What open source management processes should be in...
WHAT IS A SECURE SOFTWARE DEVELOPMENT FRAMEWORK?ENABLE GINGER
Application security is more than penetration testing. Organizations face a dilemma. Commercially, there is increasing pressure to shorten software release cycles, which in turn adds strain on software developers to produce faster release cycles. This in turn creates an environment where s...
FOCUS ON OPEN SOURCE COMPLIANCE AND SECURITY DURING LEGAL TRANSACTIONSENABLE GINGER
Data points to the fact that companies have difficulty managing third-party open source within their software code bases, leading to compliance, IP, and security risk. These risks are often amplified in legal transactions and can impact “go”/”no go” decisions if not addressed throughout th...
HOW TO SECURE TEAMS FROM EXTERNAL THREATS AND DATA LOSS
Microsoft Teams is arguably the most powerful workplace productivity tool on the market. But with such a robust solution comes a myriad of potential vulnerabilities that could affect your day-today business. In fact, both Gartner and Forrester report that 80% of SaaS breaches stem from mis...

RESOURCES

Next to your employees, your organization’s data is its most important resource. A data breach can devastate an organization’s finances and reputation for years. According to the 2019 Cost...

1. Zero Trust – DemystifiedEveryone seems to be talking about Zero Trust in the security world at the moment. Unfortunately there seems to be multiple definitions ...

Still think your current martech stack doesn't need an upgrade? Think again. 2019 is gradually coming to a close and marketing channels have shown no signs of slowing down. If you’re a marke...

The aim of marketing is to make selling superfluous.” Peter F. Drucker Tweet This! While selling is an art, it solely depends on the fact how much marketing efforts you have put in t...

We’ve all been there as modern marketers catching up to the changing trends every now and then. Virtual event marketing is the new oil, the new currency that most of us are trying to win at. But...

Get key data points about open source license compliance. Open source drives modern application development. It's popular, innovative and not going anywhere. The goal for every business is to leverage...

Mobile, the world-wide-web and the Internet of Things are driving a new digital economy. And it’s growing fast. In order to satisfy the increasing consumer demand, you need to continuously deliver hig...

In today’s fast-paced world, business leaders are under extreme pressure to innovate in order to deliver value and increase competitiveness. The role of enterprise applications in supporting these goa...

Find out about: The OT/IoT threat landscape: IoT malware Ransomware COVID-19-themed malware The tactics and techniques of the most important threat actors The top 2020 ICS vulnerabilities and their on...