NEWS

   

EVENTS

Conferences

Tech Leaders Forum: Cyber Security Update

TECH LEADERS FORUM: CYBER SECURITY UPDATE

April 20-20, 2021
80% of businesses consider cyber security to be a high priority. Almost half of businesses (46%) and a quarter of charities (26%) report having cyber security breaches or attacks in the last 12 months, causing significant disruption.

DeSales Cyber Security & Digital Forensics VIRTUAL Conference

DESALES CYBER SECURITY & DIGITAL FORENSICS VIRTUAL CONFERENCE

April 30-30, 2021
Join us for our 4th annual Cyber Security and Digital Forensics Conference at DeSales University! Our conference will now be an online event! We will have exciting presentations about cybersecurity and digital forensics topics.Please check back soon for more details on the presentations that will be...

BSides Oklahoma 2021 - Information Security Conference

BSIDES OKLAHOMA 2021 - INFORMATION SECURITY CONFERENCE

April 28-01, 2021
BSidesOK is an information security conference focused on practical knowledge that is widely available to the community. Our goal is to improve information security skills and awareness through sharing, with inexpensive training classes and a conference for attendees. The conference includes hands-o...

Cyber Security Global Summit

CYBER SECURITY GLOBAL SUMMIT

May 13-14, 2021
Offline events are gone for some time, but the tech world doesn't slow down. The Cyber Security community needs the platform to share the latest updates and use cases to improve coding skills and get architectural insights. We aim to provide an online event for Cyber Security geeks from all over...

Cyber Security for Critical Assets APAC

CYBER SECURITY FOR CRITICAL ASSETS APAC

January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

BsidesPhilly2020

BSIDESPHILLY2020

December 04-04, 2020
BSidesPhilly seeks to create awareness and improve upon the conversation and research of security topics within the Philadelphia region for researchers, professionals, and practitioners alike.  The conference aims to give these various groups a chance to meet, engage in conversation through sch...

31st ISF Annual World Congress

31ST ISF ANNUAL WORLD CONGRESS

November 14-17, 2020
The ISF provides Members with a trusted and confidential environment within which their in-depth knowledge and practical experience can be shared. This approach enables the ISF to harness the collective insights and knowledge of its Members to deliver leading-edge solutions that are comprehensive, p...

Ignite cyber security conferences

IGNITE CYBER SECURITY CONFERENCES

November 09-12, 2020
Join us at Ignite cybersecurity conference and be prepared to get your hands on the most advanced security technology and see firsthand what it can do for you. With customized learning paths scaled for both beginner and advanced, this four-day event will be overflowing with technical hands-on learni...

 

Webinars

APR 19, 2021 | 11:00 am
WEBINAR: CYBER SECURITY AND HACKING
Ransomware attacks have been hitting just about every type of business and organization such as Governments, Municipalities, Universities, Hospitals, Corporates, Banks, Insurance firms and etc. However, the encryption of the data is the last phase of the attack, it is preceded with intelli...
APR 21, 2021 | 5:00 am
CYBER SECURITY - HOW TO ESTABLISH A CYBER SECURITY TEAM
This is a non-technical event for all organisations looking to build their first internal cyber security team, or build on their existing limited provision.
APR 22, 2021 | 1:00 pm
WEBINAR - TIPS TO USE CYBER THREAT INTELLIGENCE TO DEFEND YOUR DATA
Join NetCom Learning trainer along with Managed Learning Services leader NetCom Learning for a complimentary interactive webinar on "Tips to Use Cyber Threat Intelligence to Defend Your Data"
APR 29, 2021 | 8:30 am
CYBER AWARENESS TRAINING WEBINAR
It is an unfortunate fact that in the digital age, people are a business' biggest security risk. £337,000 is the cost of a data breach to the average business.Ransomware and phishing emails are now costing the world economy about $1 trillion every year.
JUN 16, 2021 | 4:00 am
YORKSHIRE CYBERSECURITY CLUSTER WEBINAR
The YCSC is a professional network of Cyber Security practitioners and those with an interest in the industry. Created as part of the UK Cyber Security Forum to help cyber security experts and organisations across the region to collaborate and build a stronger standard of cyber security as...

CREATING A MODERN IDENTITY STRATEGY FOR HYBRID IT ENVIRONMENTS
Sponsored
The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-t...
ENSURING SECURITY VALUE THROUGH OUTCOME-BASED MDR
Managed detection and response (MDR) solutions identify active threats across an organization and then respond to eliminate, investigate, or contain them. MDR has increased in visibility and importance as organizations realize that no level of investment will provide 100% protection agains...
TRENDS IN PRIVACY AND DATA SECURITY
Privacy and data security remains a central issue, capturing the attention of consumers, regulators, and boards of directors. In this complimentary webinar, Mel Gates, Senior Legal Editor of Privacy and Data Security at Thomson Reuters, will cover: Data privacy compliance issues, with a sp...
THE VALUE OF DIVERSITY AND INCLUSION FOR LAW DEPARTMENTS
The recent Thomson Reuters/Acritas 2019 State of the Corporate Law Department report found that gender-diverse teams achieved significantly higher performance ratings, mirroring earlier research on corporate boards and teams in general. Similar results have been shown for other categories ...
THE NEW INTELLIGENT EDGE
AI. 5G. CLOUD. THE WORLD IS DIGITALLY TRANSFORMING. ARE YOU READY FOR THE NEW INTELLIGENT EDGE? Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success. By 2025, an estimated 41 billion connected devices wil...
DEVOPS WITH SIMULATION
Are you considering using simulation to develop and test your software or applications? Make continuous integration and DevOps possible for embedded development. Find out how to: Provide a 24/7 automated test lab for your entire team Increase test automation by 12,000% Achieve 30% faster t...

RESOURCES

On their road to recovery from the pandemic, businesses face unique dilemmas. This includes substantial and entirely necessary investments in digital transformation, however tight budgets are making s...

I would like to share my experience with you and talk about viruses created for Mac devices and how to deal with them. You may say that there are no Mac viruses as Apple does not allow it. However, I ...

1. Zero Trust – DemystifiedEveryone seems to be talking about Zero Trust in the security world at the moment. Unfortunately there seems to be multiple definitions ...

There is a saying, ‘you can fool all the people some of the time and some of the people all the time.’ Given the fact that there is no such thing as 100% security and human nature being tr...

For years, we have been told that cyber-attacks happen due to human-errors. Almost every person has stressed about training to prevent cyber-attacks from taking place. We have always been on the alert...

The ongoing pandemic has forced organizations across the globe to install work-from-home policies. A majority of the workforce in various industries, especially IT, have already adapting to working re...

There are several reasons to choose Linux over other operating systems such as Windows and macOS. Linux is an open-source, secure, and very lightweight operating system consuming minimal system resour...

Just about every single day, somewhere in the world, a company falls victim to cyber attackers, even with millions spent on cybersecurity.Every company is a target because they have da...

There are three significant and disruptive cybersecurity threats that are catching organizations of all types and sizes by surprise:Ransomware;Cloud misconfigura...