Kali Linux Overview: Tips, Tricks and Traps for Cybersecurity Professionals

CompTIA

Dr. James Stanger, CompTIA's Chief Technology Evangelist, has consulted with corporations, governments and learning institutions worldwide about cybersecurity, open source, network administration and help desk management for over 20 years. Organizations he has worked with include RSA, IBM, NTT Japan, Symantec, the Scottish Qualifications Authority (SQA), the US Department of Defense (DoD), the United Arab Emirates Cultural Division, the US Department of State, Meisei University, and General Dynamics.
Watch Now

Spotlight

How prepared was your organization for the pandemic of 2020? If your answer is “not very,” you are not alone. Few could have predicted the circumstances that sped up the work from home (WFH) movement and catapulted remote access to the forefront for many organizations. Prior, there was a steady trend by some to support geographi

OTHER ON-DEMAND WEBINARS

CyberSecurity CopyPortfolio Webinar

eToro

2018 was the year big tech & govt’s struggled with CyberSecurity breaches - Cyber is now an investment trend. Watch eToro's webinar with International Broadcaster, Elliott Gotkine & eToro’s CEO, Yoni Assia as they discuss cyber security.
Watch Now

Presidential Executive Order on America’s Cybersecurity Workforce - Enhancing Workforce Mobility and Supporting the Development of Cybersecurity Skills

NIST

On May 2, 2019, the President issued an Executive Order that recognized America’s cybersecurity workforce as a strategic asset that protects the American people, the homeland, and the American way of life. The executive order further recognized the need to enhance workforce mobility to improve cybersecurity and the importance of supporting the development of cybersecurity skills. This webinar will provide insights into the policy established through this executive order, the tasks and deliverables contained within it, and the consultative process to be used to execute recommendations from the 2017 Report to the President on Supporting the Growth and Sustainment of the Nation’s Cybersecurity Workforce.
Watch Now

How to Enforce Threat Intelligence at Your Perimeter

HealthcareInfoSecurity

Be it public, commercial, or private, cyber threat intelligence comes from many different sources and plays a vital role in an organization's cybersecurity strategy. But threat intelligence by itself is useless unless it can be made actionable. So once you have that intelligence in hand, how do you enforce it at the perimeter of your network? Register for this webinar and learn about: Utilizing threat intelligence from a variety of sources; How stateless technology at the network perimeter can take the load off stateful devices such as NextGen Firewalls.
Watch Now

Security Holes In The Machine Learning Pipeline

Python is the second most popular language and is very easy to start using. It is almost a de-facto standard in machine learning. Here be dragons! Many machine learning (ML) models are Python pickle files under the hood. The use of pickling conserves memory, enables start-and-stop model training, and makes trained models portable (and, thereby, shareable).
Watch Now

Spotlight

How prepared was your organization for the pandemic of 2020? If your answer is “not very,” you are not alone. Few could have predicted the circumstances that sped up the work from home (WFH) movement and catapulted remote access to the forefront for many organizations. Prior, there was a steady trend by some to support geographi

resources