Kali Linux Overview: Tips, Tricks and Traps for Cybersecurity Professionals

Dr. James Stanger, CompTIA's Chief Technology Evangelist, has consulted with corporations, governments and learning institutions worldwide about cybersecurity, open source, network administration and help desk management for over 20 years. Organizations he has worked with include RSA, IBM, NTT Japan, Symantec, the Scottish Qualifications Authority (SQA), the US Department of Defense (DoD), the United Arab Emirates Cultural Division, the US Department of State, Meisei University, and General Dynamics.
Watch Now

Spotlight

Robust and secure digital infrastructure is essential to enable the Industry 4.0 transformation. It connects systems, allowing data to be correlated and analyzed to make factories smarter, more profitable, safer, and more sustainable. Smart factories, with their array of machines, sensors, and controllers, are the future. They r

OTHER ON-DEMAND WEBINARS

Bridging the gap between on-prem and AWS security

cisco

As more organizations use a combination of their on-premises network and Amazon Web Services (AWS) to deliver services and applications, they are struggling to ensure their workloads are secure and compliant. More importantly, they need a way to satisfy these requirements in an efficient, cloud-native way to ensure security is effective.
Watch Now

IoT Security and Artificial Intelligence for better industrial applications

Watch this 45-minute free webinar, and gain insights about IoT & Industrial IoT, Edge, and AI through a detailed analysis of each stage of the IoT device lifecycle.
Watch Now

2019 Vulnerability Management Predictions

Nopsec

Michelangelo Sidagni, CTO and Parag Baxi, VP of Product Management, discussed customer comments from 2018. They covered vulnerability management complaints, requests, wishes and hopes. They have set some goals for the vulnerability management market for 2019 and discussed those goals on this webinar! Michelangelo & Parag Covered: Vulnerability scanning goals. Determining asset value. Attack Predictions: when will a vulnerability become dangerous? Vulnerability categorization. Remediation Goals.
Watch Now

Cybersecurity Ratings Part 3: The Third Way

BitSight

Learn how BitSight Security Ratings are used to monitor and manage third-party cyber risk. The third part of this (ISC)² webinar series explores how BitSight Security Ratings help organizations tackle third-party supplier risk management challenges. Bob Lewis (Former Head of External Cyber Assurance and Monitoring, Barclays UK) and Nick Trigg (BitSight Risk Consultant) share real life examples of business challenges within third-party risk and considerations when addressing those challenges.
Watch Now

Spotlight

Robust and secure digital infrastructure is essential to enable the Industry 4.0 transformation. It connects systems, allowing data to be correlated and analyzed to make factories smarter, more profitable, safer, and more sustainable. Smart factories, with their array of machines, sensors, and controllers, are the future. They r

resources