NEWS

   

EVENTS

Conferences

SLASHDATA

SLASHDATA'S FUTURE DEVELOPER SUMMIT

September 29-30, 2020
While 2020 is challenging industries, business and individuals significantly, the Future Developer Summit is determined to turn this into an enhanced learning opportunity for the developer marketing and relations community. Traditionally invite-only on-site gathering, this year the Summit opens its ...

BruCON is an annual security and hacker Conference

BRUCON IS AN ANNUAL SECURITY AND HACKER CONFERENCE

October 01-02, 2020
BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Belgium, BruCON offers a high quality line up of spe...

Florida Cyber Conference

FLORIDA CYBER CONFERENCE

October 08-09, 2020
As the COVID-19 pandemic continues to cause disruption and create uncertainty for organizations and individuals, Cyber Florida is postponing Florida Cyber Conference 2020 to a later date. That date, still to be determined, will accommodate the scheduling needs of vendors, speakers, and guests. Keep ...

GrrCON Cyber Security Summit & Hacker Conference

GRRCON CYBER SECURITY SUMMIT & HACKER CONFERENCE

October 22-23, 2020
GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people. We keep GrrCON small with around 2,000 attendance to allow us to provide those things other events leave out. Whether you ar...

Global CISO Executive Summit

GLOBAL CISO EXECUTIVE SUMMIT

September 21-23, 2020
The Governing Body of CISOs who create the agenda understand that there is 'strength in numbers,' and the challenges and opportunities faced by one organization are echoed across many. Through collaboration with our peers, this conference enables us to take advantage of the power of exponent...

Global Security Exchange (GSX) 2020

GLOBAL SECURITY EXCHANGE (GSX) 2020

September 21-23, 2020
Powered by ASIS International, Global Security Exchange (GSX) multiplies access to the expertise, connections, and innovations our community of global security professionals need to serve as valued leaders and trusted advisors in today’s complex and rapidly evolving enterprise security risk la...

2020 Cybersecurity & Fraud Summit: Toronto

2020 CYBERSECURITY & FRAUD SUMMIT: TORONTO

September 22-22, 2020
ISMG's Global Summit Series will take place across four continents focusing on global security topics such as fraud and breach prevention and on many key industry verticals such as finance, government, retail, energy and healthcare. All content will be driven by our global editorial team includi...

Techno Security & Digital Forensics Conference 2020

TECHNO SECURITY & DIGITAL FORENSICS CONFERENCE 2020

September 14-17, 2020
Comexposium is one of the world’s leading event organizers. Globally, it hosts more than 135 B2B and B2B2C events across many different sectors, significantly in agriculture, construction, fashion, food, health, leisure, real estate, retail, security, students, tourism, etc. At events, in over...

 

Webinars

OCT 05, 2020 | 9:00 PM
SECURITY+
Security+ is so important for the foundation of any cyber security professional. Join us in our one-of-a-kind certification course where you learn the ins and outs of Security+ and build the confidence to apply your skills to real-world issues. This course includes the certification vouche...
OCT 07, 2020 | 01:30 PM IST-02:30 PM IST
IST DATA PRIVACY DER GROßE VERHINDERER FÜR ANALYTICS?
Business Analysten & Datenexperten fragen mehr und mehr Daten nach, um Analytics im Unternehmen zu fördern. Die Verfügbarkeit von Daten ist dafür elementar. Allerdings ist der Datenzugriff technisch wie auch inhaltlich meist alles andere als trivial. Auf der einen Seite erschweren verteilt...
OCT 08, 2020 | 11:00 AM
CYBER SECURITY WEBINAR SERIES - SESSION I: CYBERSECURITY FOR SMALL BUSINESS
Cybersecurity planning and the implementation of cybersecurity best practices have now become critical elements in terms of California State business competitiveness. In particular, cybersecurity planning can be critical to the survival of a small business. In the State Attorney General, C...
OCT 08, 2020 | 8:30 PM
CYBER SECURE CODER (CSC) - BLENDED
Cyber Secure Coder is designed to validate the knowledge and skills required to create and develop secure applications. With over 111 billion lines of code being written every year, and application developers sourcing over 70% of their code from sources like GitHub, there has never been a ...
OCT 15, 2020 | 11:00 AM EST-12:00 EST
ENSURING SECURITY VALUE THROUGH OUTCOME-BASED MDR
Managed detection and response (MDR) solutions identify active threats across an organization and then respond to eliminate, investigate, or contain them. MDR has increased in visibility and importance as organizations realize that no level of investment will provide 100% protection agains...
OCT 16, 2020 | 2:30 AM
CYBER SECURITY BADGE
Calling all Cadettes, Seniors, and Ambassadors: Log in and spend some time with Bank of America's cybersecurity experts and earn your Cybersecurity Basics, Cybersecurity Safeguards, and Cybersecurity Investigator badges! You will learn about cybersecurity and how to protect yourself wh...

CREATING A MODERN IDENTITY STRATEGY FOR HYBRID IT ENVIRONMENTS
Sponsored
The right identity platform is a crucial component in your digital transformation and modernization of enterprise IT. In the past, Identity and Access Management systems were decisions. With the move to web, cloud and mobile, IAM has become a key variable in the formula for achieving on-t...
3-MINUTE VIDEO: OVERCOMING THE CHALLENGES OF AN UNPLANNED DISTRIBUTED WORKFORCE
When the world stayed home overnight, organizations had to rapidly solve the challenges of an unplanned distributed workforce – from maintaining visibility across the IT environment and tracking corporate and BOYD devices to closing existing and new vulnerability gaps. Tanium's unique stru...
HACKER VS CISO: HOW TO EXPLOIT/PROTECT THE WFH WORKFORCE
A Former Hacker and a Current CISO Face Off In today’s world where entire workforces were forced to move to an entirely remote work environment overnight, IT security leaders are facing new cyber attacks every day. Not only have hackers and adversaries become more sophisticated over the pa...
FOCUS ON OPEN SOURCE COMPLIANCE AND SECURITY DURING LEGAL TRANSACTIONSENABLE GINGER
Data points to the fact that companies have difficulty managing third-party open source within their software code bases, leading to compliance, IP, and security risk. These risks are often amplified in legal transactions and can impact “go”/”no go” decisions if not addressed throughout th...
YOUR CODE ISN’T STATIC YOUR PROCESSES SHOULDN’T BE EITHER
The only thing constant is change, and change requires oversight and very possibly an overhaul of your processes to support any shifts. The open source world is not exempt. Net, your code isn't static so your processes shouldn't be either. What open source management processes should be in...
WHAT IS A SECURE SOFTWARE DEVELOPMENT FRAMEWORK?ENABLE GINGER
Application security is more than penetration testing. Organizations face a dilemma. Commercially, there is increasing pressure to shorten software release cycles, which in turn adds strain on software developers to produce faster release cycles. This in turn creates an environment where s...

RESOURCES

Endpoint Protection, Detection, and Response The KuppingerCole Market Compass provides an overview of the products offerings in Endpoint Protection, Detection and Response. The Endpoint Security space...

Ten years ago, pay-per-click Internet ads revolutionized the advertising industry. Online, the once-tenuous link between advertising and sales became concrete and measurable. Instead of preaching fait...

Because mining operations require a diverse set of complex assets – many of which are mobile or in remote and hard-to-access locations – monitoring equipment health and performance can be a significan...

Next to your employees, your organization’s data is its most important resource. A data breach can devastate an organization’s finances and reputation for years. According to the 2019 Cost...

1. Zero Trust – DemystifiedEveryone seems to be talking about Zero Trust in the security world at the moment. Unfortunately there seems to be multiple definitions ...

Still think your current martech stack doesn't need an upgrade? Think again. 2019 is gradually coming to a close and marketing channels have shown no signs of slowing down. If you’re a marke...

The aim of marketing is to make selling superfluous.” Peter F. Drucker Tweet This! While selling is an art, it solely depends on the fact how much marketing efforts you have put in t...

We’ve all been there as modern marketers catching up to the changing trends every now and then. Virtual event marketing is the new oil, the new currency that most of us are trying to win at. But...

According to a Gartner study in 2018, the global Cybersecurity market is estimated to be as big as US$170.4 billion by 2022. The rapid growth in cybersecurity market is boosted by new technolo...