NEWS

   

EVENTS

Conferences

The RSA Conference 2020

THE RSA CONFERENCE 2020

July 15-17, 2020
RSA Conference has been a driving force behind the world’s cybersecurity agenda. The central point where people from around the world gather to share, learn and grow. And the place that provides a forum for innovation and partnership. It’s even more important today to have these points o...

WASHINGTON DC CYBERSECURITY CONFERENCE

WASHINGTON DC CYBERSECURITY CONFERENCE

July 23-23, 2020
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA’s business-driven security™ strategy for cyber threat detection and response, identity and access management, online fraud prevention, and governance, risk and compliance solutions. ...

23rd Black Hat USA Conference

23RD BLACK HAT USA CONFERENCE

August 01-06, 2020
Now in its 23rd year, Black Hat USA is the world's leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2020 opens with four days of technical Trainings (August 1-4) followed by the two-day main conference (August 5-6) fe...

The 7th annual SANS Security Awareness Summit

THE 7TH ANNUAL SANS SECURITY AWARENESS SUMMIT

August 05-06, 2020
The 7th annual SANS Security Awareness Summit is on and we're getting ready for our biggest and best Summit yet! Every year, we strive to provide the very best forum for security awareness officers looking to take their program to the next level! Our promise is to provide actionable lessons you ...

AWS re:Inforce Conference 2020

AWS RE:INFORCE CONFERENCE 2020

June 29-01, 2020
Due to the continued concerns about COVID-19, Amazon Web Services has cancelled AWS re:Inforce 2020, scheduled for June 29 – July 1 in Houston, TX. We've reached this decision after much consideration, as the health and safety of our customers, partners, and employees are our top priority....

33rd IEEE Computer Security Foundations Symposium

33RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM

June 22-26, 2020
The program includes papers, panels, and a poster session. Topics of interest include access control, information flow, covert channels, cryptographic protocols, database security, language-based security, authorization and trust, verification techniques, integrity and availability models, and broad...

National Cyber Summit

NATIONAL CYBER SUMMIT

June 02-04, 2020
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

INFOSECURITY EUROPE 2020

INFOSECURITY EUROPE 2020

June 02-04, 2020
After monitoring the constantly evolving COVID-19 pandemic, we have made the decision to postpone Infosecurity Europe, which was scheduled to take place from June 2- 4 in Olympia, London. The health and safety of our exhibitors, visitors, partners and staff remains our number one priority and we wil...

 

Webinars

JUL 16, 2020 | 10:30 AM
ATTACKING AND DEFENDING CLOUD NATIVE INFRASTRUCTURE
Andy has made mistakes. He's seen even more. And in this talk he details the best and the worst of the container and Kubernetes security problems he's experienced, exploited, and remediated. This talk details low level exploitable issues with container and Kubernetes deployments. W...
JUL 21, 2020 | 1:00 PM
MEASURING AND IMPROVING CYBER DEFENSE USING THE MITRE ATT&CK FRAMEWORK
Through the ATT&CK framework, MITRE has generated a gold mine of information about the most important tactics and techniques used by attackers and how the blue team can detect and prevent these actions. Blocking atomic attack indicators such as domain names and IP addresses might work ...
JUL 28, 2020 | 1:00 PM
MEASURING AND IMPROVING CYBER DEFENSE USING THE MITRE ATT&CK FRAMEWORK
In this webcast, sponsor representatives and report author John Hubbard will discuss the new SANS report, “Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework.” This roundtable will explore themes from the paper, including: Why the framework is so importa...
JUL 29, 2020 | 1:00 PM
CLOSING THE CRITICAL SKILLS GAP FOR MODERN AND EFFECTIVE SECURITY OPERATIONS CENTERS (SOCS): SURVEY RESULTS
Any successful security operations center (SOC) will combine skilled people, effective processes and efficient technology. Previous SANS surveys have shown that the skills of the people are the prime prerequisite to enable organizations to define critical SOC processes; create use cases, h...
AUG 04, 2020 | 10:00 AM
USING A MANAGED SECURITY SERVICE PROVIDER IN 2020: EVERYTHING YOU NEED TO KNOW
Despite the maturity of the managed security services provider (MSSP) market, security professionals and vendors often fail to sync up as true, successful partners. Whilst the role of the MSSP has been called into use in recent months as a result of managed services being required for a la...
AUG 19, 2020 | 1:00 PM
REAL-WORLD USE CASES OF METRICS THAT DEMONSTRATE EFFECTIVE SECURITY PRACTICES
This webcast takes a deeper dive into the topics explored in the SANS 2020 Metrics Survey to detail real-world use case examples of businesses selecting and using security metrics. Each speaker will detail a customer example of security metrics that helped reduce the risks posed by use of ...

CREATING A MODERN IDENTITY STRATEGY FOR HYBRID IT ENVIRONMENTS
Sponsored
The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-t...
WORKFORCE CONTINUITY AND THE FUTURE OF WORK
For the past 30 years Citrix has helped organizations like yours embrace the ‘future of work.’ We know that the ‘future’ itself is a moving target and external forces can hamper business and the workforce. To minimize the risk of unforeseen events and foster enduring competitive advantage ...
BUSINESS CONTINUITY INSIGHTS, CONSIDERATIONS AND RECOMMENDATIONS
Business disruptions from power outages to global pandemics impact organizations of all sizes. The goal of IT leadership within an organization is to ensure their users are still productive while maintaining some level of control of these users access to corporate resources. Creating an ef...
WORKFORCE CONTINUITY AND THE FUTURE OF WORK
For the past 30 years Citrix has helped organizations like yours embrace the ‘future of work.’ We know that the ‘future’ itself is a moving target and external forces can hamper business and the workforce. To minimize the risk of unforeseen events and foster enduring competitive advantage ...
BUSINESS CONTINUITY INSIGHTS, CONSIDERATIONS AND RECOMMENDATIONS
Business disruptions from power outages to global pandemics impact organizations of all sizes. The goal of IT leadership within an organization is to ensure their users are still productive while maintaining some level of control of these users access to corporate resources. Creating an ef...
TOP TEN WAYS TO HANDLE CONTRACTS EFFECTIVELY IN-HOUSE
Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and t...

RESOURCES

Next to your employees, your organization’s data is its most important resource. A data breach can devastate an organization’s finances and reputation for years. According to the 2019 Cost...

According to a Gartner study in 2018, the global Cybersecurity market is estimated to be as big as US$170.4 billion by 2022. The rapid growth in cybersecurity market is boosted by new technolo...

Avoiding the Security Pitfalls of Digital Transformation is a webinar that will explore how organizations can cut through the noise and make a success of cloud transformation, leveraging the benefits ...

It has been more than a month since businesses around the world started to implement contingencies in response to the Coronavirus. The Cyber Threat Index Report by Imperva Research Labs tracks changes...

Security and risk management leaders at organizations around the world are increasingly concerned about cybersecurity threats to their operational technology (OT) networks. A key driver behind this is...

COVID-19 has significantly affected individuals and organizations globally. Till this time more than 1.7 million people in 210 countries have bore the brunt of this mysterious virus. While this crisis...

What races through your mind when you see “Coronavirus” or “COVID-19”? Fear, anxiety, curiosity… these internal reactions can prompt actions that we may not normally tak...

A new list of most and least cyber secure U.S. states shows a disturbing lack of cybersecurity best practices. According to Webroot‘s fourth annual ranking, New York, California, Texas, Alabama ...

With so many of us hunting out the latest Covid-19 info, it hasn’t taken long for hackers to take advantage. So first off, a basic hygiene reminder: Don’t download anything or click on any...