NEWS

   

EVENTS

Conferences

Global Cyber Innovation Summit 2020

GLOBAL CYBER INNOVATION SUMMIT 2020

October 28-29, 2020
The Global Cyber Innovation Summit brings together a preeminent group of leading Global 2000 CISO executives, cyber technology innovators, policy thought leaders, and members of the cyber investment community to catalyze the industry into creating more effective cyber defenses. This unique, invitati...

Hacker Halted IT Security Conference

HACKER HALTED IT SECURITY CONFERENCE

October 29-30, 2020
Hacker Halted is EC-Council’s annual IT Security Conference and plays host to over 50 speakers delivering ground breaking presentations! Hacker Halted builds on the educational foundation of EC-Councils courses in ethical hacking, computer forensics, pen testing, and many others. Hacker Halted...

Gartner Security & Risk Management Summit 2020

GARTNER SECURITY & RISK MANAGEMENT SUMMIT 2020

November 02-05, 2020
With continued uncertainty relating to travel restrictions, government directives and reports from leading health organizations, Gartner has made the decision to reevaluate its conference portfolio for the remainder of 2020. As a result, we have made the decision to postpone the Gartner Security &am...

Ignite cyber security conferences

IGNITE CYBER SECURITY CONFERENCES

November 09-12, 2020
Join us at Ignite cybersecurity conference and be prepared to get your hands on the most advanced security technology and see firsthand what it can do for you. With customized learning paths scaled for both beginner and advanced, this four-day event will be overflowing with technical hands-on learni...

GrrCON Cyber Security Summit & Hacker Conference

GRRCON CYBER SECURITY SUMMIT & HACKER CONFERENCE

October 22-23, 2020
GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people. We keep GrrCON small with around 2,000 attendance to allow us to provide those things other events leave out. Whether you ar...

Global AppSec San Francisco 2020

GLOBAL APPSEC SAN FRANCISCO 2020

October 22-23, 2020
Formerly known as AppSec USA, the Global AppSec Conference is the premier application security conference for developers and security experts. Designed for private and public sector infosec professionals, the OWASP three day training and two day conference equips developers, defenders, and advocates...

Florida Cyber Conference

FLORIDA CYBER CONFERENCE

October 08-09, 2020
As the COVID-19 pandemic continues to cause disruption and create uncertainty for organizations and individuals, Cyber Florida is postponing Florida Cyber Conference 2020 to a later date. That date, still to be determined, will accommodate the scheduling needs of vendors, speakers, and guests. Keep ...

BruCON is an annual security and hacker Conference

BRUCON IS AN ANNUAL SECURITY AND HACKER CONFERENCE

October 01-02, 2020
BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Belgium, BruCON offers a high quality line up of spe...

 

Webinars

OCT 27, 2020 | 11:30 PM IST-12:30AM IST
EVERY SECOND COUNTS: AVOIDING THE MOST COSTLY BREACH RESPONSE MISTAKES
The decisions made in the seconds, minutes, and hours of a security breach carry long-term repercussions in multiple areas of an organization. Making the wrong move in the heat of the moment can cost a fortune; it can even end a career. We’ve assembled a roundtable of incident response exp...
OCT 27, 2020 | 6:30 PM
GRAYHAT - 2020 | BASIC INFRASTRUCTURE HACKING
The class begins with laying a foundation for everyone by discussing the basic concepts and gradually builds up to the level where attendees not only use the tools and techniques to hack various components involved in infrastructure hacking, but also walk away with a solid understanding of...
OCT 29, 2020 | 11:00
RANSOMWARE DEFENSE WITH MICRO-SEGMENTATION: FROM STRATEGY TO EXECUTION
To prevent ransomware from taking over your organization’s resources, your network must be internally segmented. This stops the malware from moving freely inside the network from one infected computer to the next.
OCT 29, 2020 | 13:00
EXTENDED THREAT DETECTION AND RESPONSE: CRITICAL STEPS AND A CRITICAL SYSTEM
For modern organizations, the ability to implement effective threat detection and response is paramount. Given the extensive cyber-risks that now threaten organizations, it is crucial that threat detection and response approaches are holistically sufficient to combat the numerous risks fac...
NOV 05, 2020 | 11:00 AM
CISO PERSPECTIVES: ZERO TRUST-AS-A-SERVICE
Gain perspective on: The shift in security challenges, current security concerns, and future challenges; Main components of Zero Trust-as-a-Service; Zero Trust-as-a-Service implementation and deployment best practice; How Zero Trust-as-a-Service solving security challenges in a hybrid IT e...
NOV 05, 2020 | 10:00
WEB APP AND PORTAL PROTECTION: MANAGING FILE UPLOAD SECURITY THREATS
File upload protection is a critical gap in web app security. How do you secure public portals and web applications from malicious attacks via file uploads?  Organizations increasingly rely on web portals and web apps for critical customer and client interactions. Developing public-fa...

CREATING A MODERN IDENTITY STRATEGY FOR HYBRID IT ENVIRONMENTS
Sponsored
The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-t...
ENSURING SECURITY VALUE THROUGH OUTCOME-BASED MDR
Managed detection and response (MDR) solutions identify active threats across an organization and then respond to eliminate, investigate, or contain them. MDR has increased in visibility and importance as organizations realize that no level of investment will provide 100% protection agains...
TRENDS IN PRIVACY AND DATA SECURITY
Privacy and data security remains a central issue, capturing the attention of consumers, regulators, and boards of directors. In this complimentary webinar, Mel Gates, Senior Legal Editor of Privacy and Data Security at Thomson Reuters, will cover: Data privacy compliance issues, with a sp...
THE VALUE OF DIVERSITY AND INCLUSION FOR LAW DEPARTMENTS
The recent Thomson Reuters/Acritas 2019 State of the Corporate Law Department report found that gender-diverse teams achieved significantly higher performance ratings, mirroring earlier research on corporate boards and teams in general. Similar results have been shown for other categories ...
THE NEW INTELLIGENT EDGE
AI. 5G. CLOUD. THE WORLD IS DIGITALLY TRANSFORMING. ARE YOU READY FOR THE NEW INTELLIGENT EDGE? Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success. By 2025, an estimated 41 billion connected devices wil...
DEVOPS WITH SIMULATION
Are you considering using simulation to develop and test your software or applications? Make continuous integration and DevOps possible for embedded development. Find out how to: Provide a 24/7 automated test lab for your entire team Increase test automation by 12,000% Achieve 30% faster t...

RESOURCES

Next to your employees, your organization’s data is its most important resource. A data breach can devastate an organization’s finances and reputation for years. According to the 2019 Cost...

1. Zero Trust – DemystifiedEveryone seems to be talking about Zero Trust in the security world at the moment. Unfortunately there seems to be multiple definitions ...

Still think your current martech stack doesn't need an upgrade? Think again. 2019 is gradually coming to a close and marketing channels have shown no signs of slowing down. If you’re a marke...

The aim of marketing is to make selling superfluous.” Peter F. Drucker Tweet This! While selling is an art, it solely depends on the fact how much marketing efforts you have put in t...

We’ve all been there as modern marketers catching up to the changing trends every now and then. Virtual event marketing is the new oil, the new currency that most of us are trying to win at. But...

According to a Gartner study in 2018, the global Cybersecurity market is estimated to be as big as US$170.4 billion by 2022. The rapid growth in cybersecurity market is boosted by new technolo...

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits ...

It has been more than a month since businesses around the world started to implement contingencies in response to the Coronavirus. The Cyber Threat Index Report by Imperva Research Labs tracks changes...

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is...