NEWS

   

EVENTS

Conferences

 Aprimo Sync! 2020 (Global)

APRIMO SYNC! 2020 (GLOBAL)

April 07-09, 2020
Join us at Aprimo Sync! 2019 to experience peer-driven interactive discussions led by industry thought leaders, on-site and off-site networking opportunities with peers and leaders, and more. Early bird pricing is still available!

Bsides Seattle 2020

BSIDES SEATTLE 2020

April 18-18, 2020
Bsides Seattle is a community based conference for individuals in or interested in Information Security. Founded in 2012, Bsides Seattle continues to provide space for the open sharing of ideas, concepts and debates.

ContentTECH Summit

CONTENTTECH SUMMIT

April 20-22, 2020
Our ContentTECH mission is clear: We want to show how the effective use of technology and better processes can help your strategic efforts to create, manage, deliver and scale your enterprise content and provide your customers with better digital experiences. Come to the ContentTECH Summit to learn ...

 ICS cyber security conference

ICS CYBER SECURITY CONFERENCE

April 28-30, 2020
As the most established Industrial Control Systems Cyber Security Event in Europe, the ICS cyber security conference brings together leading practitioners, operators and decision makers form across Europe to share a wealth of  practical experience in implementing cyber security in organisations...

RICHMOND CYBER SECURITY FORUM

RICHMOND CYBER SECURITY FORUM

April 01-01, 2020
The Richmond Cyber Security Forum in London will include a first class, CPD accredited conference programme of keynotes, interactive workshops, think tanks and personal development sessions. The opportunity to connect and engage with industry peers in a relaxed informal setting and the chance to dis...

Infosec World

INFOSEC WORLD

March 30-01, 2020
The cybersecurity community is diligent when it comes to continuous learning and refining their expert knowledge, but the task is daunting when emerging technologies keep changing what it means to be secure. Add distrustful individuals to the mix, and it’s nearly impossible to predict what the...

BSides Atlanta

BSIDES ATLANTA

March 28-28, 2020
Each BSides is a community-driven framework for building events for and by information security community members. The goal is to expand the spectrum of conversation beyond the traditional confines of space and time. It creates opportunities for individuals to both present and participate in an inti...

Cyber Security for Critical Assets

CYBER SECURITY FOR CRITICAL ASSETS

March 24-25, 2020
While cybercrime steadily increases in the U.S., organizations still perceive cybersecurity as exceedingly complex and feel like they’re chronically late to the party – trying to learn the lessons from past incidents while malicious hackers continually innovate. CS4CA USA, returning for ...

 

Webinars

APR 07, 2020 | 10:30 AM
DRIVING CYBERSECURITY CHANGE – ESTABLISHING A CULTURE OF PROTECT, DETECT AND RESPOND HIGHLIGHTS
Cybersecurity is no longer just about technology it is ultimately about organizational change. Change in not only how people think about security but what they prioritize and how they act, from the Board of Directors on down. Organizational change is a field of management study that enable...
APR 07, 2020 | 11:00 AM
UNDERSTAND MOBILE RISK AND HOW TO PROTECT CLOUD DATA: LOOKOUT MOBILE THREAT DEFENSE
Cloud-based internet security is an outsourced solution for storing data. Instead of saving data onto local hard drives, users store data on Internet-connected servers. Data Centers manage these servers to keep the data safe and secure to access.The security issues faced can be broadly cat...
APR 08, 2020 | 10:00 AM
CLOUD DISTRIBUTION: CYNET – PROTECTION FOR HOME WORKERS
What is the current impact on the Threat Landscape and how can you protect your home-working customers? In this webinar, Cynet will share data-based insights into the cybersecurity effect of the mass quarantine policy that’s becoming the common practice in an increasing number of ter...
APR 09, 2020 | 10:00 AM
THE IMPACT OF #COVID19 ON THE INFOSEC INDUSTRY
The highly-infectious coronavirus, or COVID-19, is spreading across the globe at an alarming rate, significantly impacting a vast array of sectors and verticals. The information security sector is no exception. As countries around the world attempt to slow the spread of the virus, one of t...
APR 15, 2020
AI, MACHINE LEARNING, BEHAVIORAL ANALYSIS AND BLOCKCHAIN: THE NEXT GENERATION OF CYBERSECURITY
AI, machine learning, behavioral analysis, and blockchain are on the bleeding edge of security solutions technology, and may be the key to current and future threat detection and mitigation. While many companies are just beginning to explore uses for these technologies, many security techn...
APR 16, 2020 | 10:00 AM PST-11:00 AM PST
NEW INSIGHTS AND RESEARCH INTO ATTACK SURFACE REDUCTION
Most organizations believe they have their network locked down: they know what they have exposed to the Internet and what they have safely protected behind the firewall. But the truth is that almost no major organization has a complete picture of its true Internet attack surface. This webi...

SOLICITA UNA DEMOSTRACIÓN EN DIRECTO DE DYNAMICS 365 SUPPLY CHAIN MANAGEMENT
Fija una cita para una orientación personalizada en directo sobre cómo puedes aumentar al máximo la eficiencia operativa y en la cadena de suministro, la calidad de los productos y la rentabilidad con el IoT (Internet de las cosas), datos e inteligencia de IA para obtener conocimientos úti...
SOLICITA UNA DEMOSTRACIÓN EN VIVO DE DYNAMICS 365 FINANCE
Programa un tutorial individual en vivo para saber cómo Microsoft Dynamics 365 Finance puede ayudar a todo el personal de tu organización a tomar decisiones inteligentes que mejoren los procesos e impulsen el crecimiento. En esta demostración personalizada, verás cómo Dynamics 365 te ofrec...
KEY CONSIDERATIONS FOR SAAS SECURITY AND PERFORMANCE
Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT oper...
5 REASONS WHY A PEOPLE-CENTRIC SECURITY STRATEGY SAFEGUARDS SENSITIVE INFORMATION AND FACILITATES COMPLIANCE
Users often ignore internal security controls in order to get work done quickly. This puts the security of confidential information at risk. Tune in to this webinar to learn why a people-centric approach to security is the best way to protect your company’s sensitive data and IP, to achiev...
WE'RE NAMED A LEADER. AGAIN. GARTNER MAGIC QUADRANT FOR UEM TOOLS
Gartner has named us a Leader for unified endpoint management tools (UEM) again in 2019.* Whether desktops, laptops, smartphones, tablets, or IoT, our solution makes it easier for IT teams to take a modern, secure approach to managing all devices. All from a single platform. Download the 2...
A CIO’S GUIDE TO MAXIMIZING THE VALUE OF INTEGRATION AND APIS
From our work with thousands of enterprise customers around the world, we’ve learned that API-led connectivity brings major benefits like increased speed, agility, and scalability. Now, CIOs and chief architects across all industries can measure these benefits objectively. In this webinar,...

RESOURCES

A decade ago, Stuxnet pulled me into the accelerating, widening gyre of cybersecurity. I began to devote less time to global health, a topic on which I spent the previous decade developing familiarity...

In these challenging times, it’s sad to learn that cyber criminals are only increasing their activity as they look to capitalise on the Covid-19 crisis. With the NCSC (National Cyber Security Ce...

Measures to mitigate the outbreak of COVID-19 have led to an unprecedented increase in remote working across the board. Our guest author Philip Blake, European Regional Director at EC-Council and cybe...

How can progress be measured when it comes to shifts in national security strategy and practice? Several assessment variables might include changes in official national guidance, legal authorities, ty...

Read the Deck 7 Webinar Benchmarks & Best Practices Report to see how your webinars measure against market benchmarks. And learn about the best practices...

The Cybersecurity Solarium Commission's recently released report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and prepare for resiliency and response bef...

Cynet has revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. The Coronavirus is hitting ha...

Cybersecurity has never been more important for every level of our government.The hacking attempts at major federal agencies have raised the profile of nefarious actors who use their highly ad...

L'impronta digitale della tua azienda è cresciuta in modo esponenziale. Quindi, come si fa a rimanere sicuri e conformi pur rimanendo al passo con la crescita? Questo e-Book mostra il percorso verso u...