NEWS

   

EVENTS

Conferences

RSA Conference 2020

RSA CONFERENCE 2020

February 24-28, 2020
McAfee protects data and defends against threats where modern work gets done: on devices and in the cloud. The MVISION platform is cloud-born, unified and open. Visit the "McAfee booth (#5745)" to talk with one of our security experts about how MVISION’s device-to-cloud advantage can...

15th International Conference on Cyber Warfare and Security

15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY

March 12-13, 2020
ICCWS uniquely addresses cyber security, cyber warfare and information warfare. For the past 15 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings ...

Cybersecurity and Cloud Expo global 2020

CYBERSECURITY AND CLOUD EXPO GLOBAL 2020

March 17-18, 2020
The conference agenda will tackle the real issues facing CISOs and security professionals today as modern enterprises evolve, as well as showcasing the most innovative and important developments in the security solutions market.

IT-SECURITY CONFERENCE TROOPERS20

IT-SECURITY CONFERENCE TROOPERS20

March 16-20, 2020
This security conference is based in beautiful Heidelberg, Germany, and for us, merely visiting the city would be enough of a reason to check out TROOPERS. As luck would have it, this valuable conference consists of two-day training and a two-day conference where many IT and security experts from al...

The award-winning 9th Annual European Information Security Summit

THE AWARD-WINNING 9TH ANNUAL EUROPEAN INFORMATION SECURITY SUMMIT

February 12-13, 2020
The European Information Security Summit is now the largest and most comprehensive cyber security summit in Europe. It features parallel streams focusing on Culture & Education, Data & Technology, and the Threat Landscape – giving you three conferences in one. In addition, TEISS also f...

Cybernetix.world 2020

CYBERNETIX.WORLD 2020

February 04-05, 2020
The image of our future is changing rapidly. The technological advancements of the last decade offer unique opportunities for business growth and make the inclusion of societies which are left behind possible. But, it also presents society with security and ethical challenges. We witness the rise of...

Fifth Annual Atlanta Cyber Security Summit

FIFTH ANNUAL ATLANTA CYBER SECURITY SUMMIT

February 05-05, 2020
The Fifth Annual Atlanta Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactiv...

DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY

DACH STRATEGYFORUM CYBER AND INFORMATION SECURITY

January 28-29, 2020
IN DISCUSSION. Protecting your business through ai and automation. The impact of geopolitics on your security strategy. From guardian to companion of digitization - developing the ciso's role. Developing employee awareness or is trust your best defence? Do we need the cloud and how to use it saf...

 

Webinars

FEB 27, 2020 | 2:00 PM
THALES TRUSTED CYBER TECHNOLOGIES: THE FUTURE OF ENCRYPTING NETWORK DATA
High-speed data networks are not inherently secure. Public and private network infrastructure are exposed to a multitude of cyber-threats, and with the rapid growth of IoT, Virtualization, Big Data Applications, Cloud, and Data Centric Services, the need for high data volume (100Gbps+ link...
FEB 27, 2020 | 2:00 PM
UNRAVELING CDM DEFEND: DECIPHERING THE CRITICAL
Join our webinar to break down the new DHS Continuous Diagnostics and Mitigation (CDM) DEFEND contract. Attendees will learn at a high level what capabilities you can receive through CDM DEFEND and how to navigate what is the most important for your agency.
FEB 27, 2020 | 2:00 PM
3 PROVEN STRATEGIES TO PREPARE FOR A PHISHING ATTACK
The number of phishing attempts grows each day, and hackers transform the messages constantly in hopes of duping users. Organizations must do more than install the latest technology. They must also focus cybersecurity efforts on employee education and behavior modification. Humans have sen...
MAR 05, 2020 | 10:00 AM
MAKE YOUR OWN SECURITY SUPERSTARS: SCALE AND UPSKILL YOUR SECURITY TEAM
Businesses these days face two main challenges: they have too much technology, and they don’t have the people to run and manage it. This has led organizations to come up with new ways to make their existing security resources more effective, and scale their existing human and technol...
MAR 10, 2020 | 7:30 PM
5 THINGS A HACKER DOESN'T WANT YOU TO KNOW
It is therefore essential to understand the threats against your organisation and ensure your incident response plan is versatile and well tested. So, what can you do to keep your business safe? Join this webinar to discover the five things a hacker doesn’t want you to know and the p...
MAR 10, 2020 | 2:00 PM
CYBERSECURITY FOR SMALL TO MEDIUM-SIZED GOVERNMENT CONTRACTORS: WHAT YOU SHOULD KNOW
Are you a government contractor? Do you want to be? Join the National Cyber Security Alliance and special guests on March 10th to understand what your cybersecurity responsibilities are if you store, process, or transmit Controlled Unclassified Information (CUI) or provide security protect...

SOLICITA UNA DEMOSTRACIÓN EN DIRECTO DE DYNAMICS 365 SUPPLY CHAIN MANAGEMENT
Fija una cita para una orientación personalizada en directo sobre cómo puedes aumentar al máximo la eficiencia operativa y en la cadena de suministro, la calidad de los productos y la rentabilidad con el IoT (Internet de las cosas), datos e inteligencia de IA para obtener conocimientos úti...
SOLICITA UNA DEMOSTRACIÓN EN VIVO DE DYNAMICS 365 FINANCE
Programa un tutorial individual en vivo para saber cómo Microsoft Dynamics 365 Finance puede ayudar a todo el personal de tu organización a tomar decisiones inteligentes que mejoren los procesos e impulsen el crecimiento. En esta demostración personalizada, verás cómo Dynamics 365 te ofrec...
KEY CONSIDERATIONS FOR SAAS SECURITY AND PERFORMANCE
Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT oper...
5 REASONS WHY A PEOPLE-CENTRIC SECURITY STRATEGY SAFEGUARDS SENSITIVE INFORMATION AND FACILITATES COMPLIANCE
Users often ignore internal security controls in order to get work done quickly. This puts the security of confidential information at risk. Tune in to this webinar to learn why a people-centric approach to security is the best way to protect your company’s sensitive data and IP, to achiev...
WE'RE NAMED A LEADER. AGAIN. GARTNER MAGIC QUADRANT FOR UEM TOOLS
Gartner has named us a Leader for unified endpoint management tools (UEM) again in 2019.* Whether desktops, laptops, smartphones, tablets, or IoT, our solution makes it easier for IT teams to take a modern, secure approach to managing all devices. All from a single platform. Download the 2...
A CIO’S GUIDE TO MAXIMIZING THE VALUE OF INTEGRATION AND APIS
From our work with thousands of enterprise customers around the world, we’ve learned that API-led connectivity brings major benefits like increased speed, agility, and scalability. Now, CIOs and chief architects across all industries can measure these benefits objectively. In this webinar,...

RESOURCES

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to ...

Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives inv...

Technology is reshaping society – artificial intelligence (AI) is enabling us to increase crop yields, protect endangered animals and improve access to healthcare. Technology is also transformin...

Matt Newton, senior portfolio marketing manager at AVEVA, discusses how IIoT can best cyber security challenges met through software adoption. According to Gartner’s 2019 Industrial IoT Platform...

When you’re making big decisions about how to run your business and what tools you need to succeed, information is crucial. Even more important, though, is accurate information. With that in mind, we’...

Communication and collaboration are the key to taking your business to the next level. Using the proven principles in this guide, learn how to unlock your team’s creativity and drive growth. Microsoft...

Your remote team members face common challenges. Fortunately, there are great ways to help everyone collaborate better, work smarter and stay more secure. Access the full guide and get the most from t...

The subject of how information security impacts different industry sectors is an intriguing one. For example, how does the finance industry fare in terms of information security compared to the health...

Researchers have identified eight malicious Android apps in the official Google Play marketplace distributing a new malware family. The “Haken” malware exfiltrates sensitive data from vict...