NEWS

   

EVENTS

Conferences

National Cyber Summit

NATIONAL CYBER SUMMIT

June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

Cyber Security for Critical Assets APAC

CYBER SECURITY FOR CRITICAL ASSETS APAC

January 27-28, 2021
The coronavirus pandemic has caused a surge in cyberthreats and attacks, a lot of which have targeted companies whose employees must now access critical infrastructure, such as industrial control systems (ICS) and operational technology (OT) networks, from home. But that critical infrastructure, whi...

BsidesPhilly2020

BSIDESPHILLY2020

December 04-04, 2020
BSidesPhilly seeks to create awareness and improve upon the conversation and research of security topics within the Philadelphia region for researchers, professionals, and practitioners alike.  The conference aims to give these various groups a chance to meet, engage in conversation through sch...

31st ISF Annual World Congress

31ST ISF ANNUAL WORLD CONGRESS

November 14-17, 2020
The ISF provides Members with a trusted and confidential environment within which their in-depth knowledge and practical experience can be shared. This approach enables the ISF to harness the collective insights and knowledge of its Members to deliver leading-edge solutions that are comprehensive, p...

Ignite cyber security conferences

IGNITE CYBER SECURITY CONFERENCES

November 09-12, 2020
Join us at Ignite cybersecurity conference and be prepared to get your hands on the most advanced security technology and see firsthand what it can do for you. With customized learning paths scaled for both beginner and advanced, this four-day event will be overflowing with technical hands-on learni...

 

Webinars

MAR 01, 2021 | 10:00 am
DEVELOPING A CYBER SECURITY INCIDENT RESPONSE PLAN
Join the East Midlands Special Operations Unit Engagement Team for cybercrime as we discuss how to develop a cyber security incident response plan.
MAR 03, 2021
PROTECT YOUR OPERATIONS AGAINST CYBER ATTACKS
On February 5, a water treatment facility in Oldsmar, Florida was the victim of a cyber attack - when a hacker gained access to Oldsmar's water treatment plant, bumping the sodium hydroxide in the water to a dangerous level.
MAR 08, 2021 | 11:00 am
CELEBRATING INTERNATIONAL WOMEN’S DAY: CARVING A CYBERSECURITY CAREER PATH
To mark the 46th annual International Women’s Day on March 8, 2021, (ISC)2 is proud to present a panel of accomplished women in the field of cybersecurity for a webinar discussion at 11:00am Eastern. This group will come together to discuss data on the demographics that make up the w...
MAR 09, 2021 | 12:00 pm
HRIC TECH TUESDAY - STATE OF CYBER
Cyber-attacks are rapidly growing in intensity, frequency, and sophistication, resulting in exponential growth in cyber risk exposure to all stakeholders. Whether yours is a multinational corporation, a mid-size regional company, or a fast-growing local business, you and your organization ...
MAR 10, 2021 | 9:00 am
CYBER SECURITY
Karl Hargrave has over twenty-years experience in business development and delivery of cyber security solutions, business management software and managed services IT solutions to leading UK organisations. Used to working at board level helping organisations transform their businesses using...
MAR 16, 2021 | 11:00 AM EST-12:00PM EST
MAKING IT A PRIORITY – WHY DEVICE VENDORS AND ASSET OWNERS ARE FOCUSING ON PRODUCT SECURITY
With the surge in product and device connectivity and the overwhelming risk of inherited supply chain exposures, there are more opportunities than ever for malicious actors to exploit the devices’ software security vulnerabilities. Many device manufacturers and asset owners are still somet...

CREATING A MODERN IDENTITY STRATEGY FOR HYBRID IT ENVIRONMENTS
Sponsored
The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-t...
ENSURING SECURITY VALUE THROUGH OUTCOME-BASED MDR
Managed detection and response (MDR) solutions identify active threats across an organization and then respond to eliminate, investigate, or contain them. MDR has increased in visibility and importance as organizations realize that no level of investment will provide 100% protection agains...
TRENDS IN PRIVACY AND DATA SECURITY
Privacy and data security remains a central issue, capturing the attention of consumers, regulators, and boards of directors. In this complimentary webinar, Mel Gates, Senior Legal Editor of Privacy and Data Security at Thomson Reuters, will cover: Data privacy compliance issues, with a sp...
THE VALUE OF DIVERSITY AND INCLUSION FOR LAW DEPARTMENTS
The recent Thomson Reuters/Acritas 2019 State of the Corporate Law Department report found that gender-diverse teams achieved significantly higher performance ratings, mirroring earlier research on corporate boards and teams in general. Similar results have been shown for other categories ...
THE NEW INTELLIGENT EDGE
AI. 5G. CLOUD. THE WORLD IS DIGITALLY TRANSFORMING. ARE YOU READY FOR THE NEW INTELLIGENT EDGE? Learn about the four drivers of digital transformation at the intelligent edge and the key questions that will help architect your success. By 2025, an estimated 41 billion connected devices wil...
DEVOPS WITH SIMULATION
Are you considering using simulation to develop and test your software or applications? Make continuous integration and DevOps possible for embedded development. Find out how to: Provide a 24/7 automated test lab for your entire team Increase test automation by 12,000% Achieve 30% faster t...

RESOURCES

On their road to recovery from the pandemic, businesses face unique dilemmas. This includes substantial and entirely necessary investments in digital transformation, however tight budgets are making s...

I would like to share my experience with you and talk about viruses created for Mac devices and how to deal with them. You may say that there are no Mac viruses as Apple does not allow it. However, I ...

1. Zero Trust – DemystifiedEveryone seems to be talking about Zero Trust in the security world at the moment. Unfortunately there seems to be multiple definitions ...

There is a saying, ‘you can fool all the people some of the time and some of the people all the time.’ Given the fact that there is no such thing as 100% security and human nature being tr...

For years, we have been told that cyber-attacks happen due to human-errors. Almost every person has stressed about training to prevent cyber-attacks from taking place. We have always been on the alert...

The ongoing pandemic has forced organizations across the globe to install work-from-home policies. A majority of the workforce in various industries, especially IT, have already adapting to working re...

There are several reasons to choose Linux over other operating systems such as Windows and macOS. Linux is an open-source, secure, and very lightweight operating system consuming minimal system resour...

Just about every single day, somewhere in the world, a company falls victim to cyber attackers, even with millions spent on cybersecurity.Every company is a target because they have da...

There are three significant and disruptive cybersecurity threats that are catching organizations of all types and sizes by surprise:Ransomware;Cloud misconfigura...