NEWS

   

EVENTS

Conferences

RICHMOND CYBER SECURITY FORUM

RICHMOND CYBER SECURITY FORUM

April 01-01, 2020
The Richmond Cyber Security Forum in London will include a first class, CPD accredited conference programme of keynotes, interactive workshops, think tanks and personal development sessions. The opportunity to connect and engage with industry peers in a relaxed informal setting and the chance to dis...

Infosec World

INFOSEC WORLD

March 30-01, 2020
The cybersecurity community is diligent when it comes to continuous learning and refining their expert knowledge, but the task is daunting when emerging technologies keep changing what it means to be secure. Add distrustful individuals to the mix, and it’s nearly impossible to predict what the...

Black Hat Asia 2020

BLACK HAT ASIA 2020

March 31-03, 2020
Black Hat returns to Marina Bay Sands in Singapore, March 31 - April 3, 2020. The information security community comes together for esteemed Trainings taught by industry experts, innovative research presentations at Briefings, the latest open-source tool demos in Arsenal, and the Business Hall featu...

 Aprimo Sync! 2020 (Global)

APRIMO SYNC! 2020 (GLOBAL)

April 07-09, 2020
Join us at Aprimo Sync! 2019 to experience peer-driven interactive discussions led by industry thought leaders, on-site and off-site networking opportunities with peers and leaders, and more. Early bird pricing is still available!

Cyber Security for Critical Assets

CYBER SECURITY FOR CRITICAL ASSETS

March 24-25, 2020
While cybercrime steadily increases in the U.S., organizations still perceive cybersecurity as exceedingly complex and feel like they’re chronically late to the party – trying to learn the lessons from past incidents while malicious hackers continually innovate. CS4CA USA, returning for ...

IT-SECURITY CONFERENCE TROOPERS20

IT-SECURITY CONFERENCE TROOPERS20

March 16-20, 2020
This security conference is based in beautiful Heidelberg, Germany, and for us, merely visiting the city would be enough of a reason to check out TROOPERS. As luck would have it, this valuable conference consists of two-day training and a two-day conference where many IT and security experts from al...

Cybersecurity and Cloud Expo global 2020

CYBERSECURITY AND CLOUD EXPO GLOBAL 2020

March 17-18, 2020
The conference agenda will tackle the real issues facing CISOs and security professionals today as modern enterprises evolve, as well as showcasing the most innovative and important developments in the security solutions market.

15th International Conference on Cyber Warfare and Security

15TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY

March 12-13, 2020
ICCWS uniquely addresses cyber security, cyber warfare and information warfare. For the past 15 years ICCWS has developed into an important conference in the cyber-security field, attracting academics, military professionals and practitioners from around the world to present their research findings ...

 

Webinars

MAR 31, 2020 | 11:00 AM
THE ART OF THE FEMININE IN THE WORLD OF CYBER
In this webinar, you will learn how to be your own advocate in life, health, and in your profession, especially in the cyber field.  You will also learn how expansive and encompassing cyber is, the multitude of paths you can take to gain experience and to create your journey to leader...
APR 01, 2020 | 1:00 PM
NETWORK VISIBILITY AND THREAT DETECTION: A SANS SURVEY
Visibility into the entire hybrid ecosystem is essential to protecting your organization’s most critical assets. This survey is designed to understand the current state of organizations’ level of visibility and access to the data they need to understand what is connected to ena...
APR 07, 2020 | 10:30 AM
DRIVING CYBERSECURITY CHANGE – ESTABLISHING A CULTURE OF PROTECT, DETECT AND RESPOND HIGHLIGHTS
Cybersecurity is no longer just about technology it is ultimately about organizational change. Change in not only how people think about security but what they prioritize and how they act, from the Board of Directors on down. Organizational change is a field of management study that enable...
APR 07, 2020 | 11:00 AM
UNDERSTAND MOBILE RISK AND HOW TO PROTECT CLOUD DATA: LOOKOUT MOBILE THREAT DEFENSE
Cloud-based internet security is an outsourced solution for storing data. Instead of saving data onto local hard drives, users store data on Internet-connected servers. Data Centers manage these servers to keep the data safe and secure to access.The security issues faced can be broadly cat...
APR 08, 2020 | 10:00 AM
CLOUD DISTRIBUTION: CYNET – PROTECTION FOR HOME WORKERS
What is the current impact on the Threat Landscape and how can you protect your home-working customers? In this webinar, Cynet will share data-based insights into the cybersecurity effect of the mass quarantine policy that’s becoming the common practice in an increasing number of ter...
APR 09, 2020 | 10:00 AM
THE IMPACT OF #COVID19 ON THE INFOSEC INDUSTRY
The highly-infectious coronavirus, or COVID-19, is spreading across the globe at an alarming rate, significantly impacting a vast array of sectors and verticals. The information security sector is no exception. As countries around the world attempt to slow the spread of the virus, one of t...

SOLICITA UNA DEMOSTRACIÓN EN DIRECTO DE DYNAMICS 365 SUPPLY CHAIN MANAGEMENT
Fija una cita para una orientación personalizada en directo sobre cómo puedes aumentar al máximo la eficiencia operativa y en la cadena de suministro, la calidad de los productos y la rentabilidad con el IoT (Internet de las cosas), datos e inteligencia de IA para obtener conocimientos úti...
SOLICITA UNA DEMOSTRACIÓN EN VIVO DE DYNAMICS 365 FINANCE
Programa un tutorial individual en vivo para saber cómo Microsoft Dynamics 365 Finance puede ayudar a todo el personal de tu organización a tomar decisiones inteligentes que mejoren los procesos e impulsen el crecimiento. En esta demostración personalizada, verás cómo Dynamics 365 te ofrec...
KEY CONSIDERATIONS FOR SAAS SECURITY AND PERFORMANCE
Companies are turning to Software as a Service (SaaS) to ease their cloud transformation and increase agility. According to a Bettercloud survey, 73% of all companies say that nearly all of their apps will be SaaS by 2020. SaaS offers speed to market, great functionality, and lower IT oper...
5 REASONS WHY A PEOPLE-CENTRIC SECURITY STRATEGY SAFEGUARDS SENSITIVE INFORMATION AND FACILITATES COMPLIANCE
Users often ignore internal security controls in order to get work done quickly. This puts the security of confidential information at risk. Tune in to this webinar to learn why a people-centric approach to security is the best way to protect your company’s sensitive data and IP, to achiev...
WE'RE NAMED A LEADER. AGAIN. GARTNER MAGIC QUADRANT FOR UEM TOOLS
Gartner has named us a Leader for unified endpoint management tools (UEM) again in 2019.* Whether desktops, laptops, smartphones, tablets, or IoT, our solution makes it easier for IT teams to take a modern, secure approach to managing all devices. All from a single platform. Download the 2...
A CIO’S GUIDE TO MAXIMIZING THE VALUE OF INTEGRATION AND APIS
From our work with thousands of enterprise customers around the world, we’ve learned that API-led connectivity brings major benefits like increased speed, agility, and scalability. Now, CIOs and chief architects across all industries can measure these benefits objectively. In this webinar,...

RESOURCES

In these challenging times, it’s sad to learn that cyber criminals are only increasing their activity as they look to capitalise on the Covid-19 crisis. With the NCSC (National Cyber Security Ce...

Measures to mitigate the outbreak of COVID-19 have led to an unprecedented increase in remote working across the board. Our guest author Philip Blake, European Regional Director at EC-Council and cybe...

How can progress be measured when it comes to shifts in national security strategy and practice? Several assessment variables might include changes in official national guidance, legal authorities, ty...

Read the 2019 Webinar Benchmarks Report to see how your webinars measure against market benchmarks. And learn about the best practices to make your webinars more successful....

The Cybersecurity Solarium Commission's recently released report outlines a strategy to fundamentally reshape the U.S.’s approach to cybersecurity and prepare for resiliency and response bef...

Cynet has revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. The Coronavirus is hitting ha...

Cybersecurity technology has become increasingly sophisticated over the last decade. Tools for securing the enterprise are faster and stronger and, as processing speeds have increased, it has become p...

Cybersecurity has never been more important for every level of our government.The hacking attempts at major federal agencies have raised the profile of nefarious actors who use their highly ad...

As the coronavirus pandemic continues to sweep the globe, and cities and states impose social-distancing measures, businesses are sending their users home to work. And this massive, unprecedented shif...