.

EVENTS

home.aspx
   
BsidesPhilly2020
BSIDESPHILLY2020
December 04-04, 2020
BSidesPhilly seeks to create awareness and improve upon the conversation and research of security topics within the Philadelphia region for researchers, professionals, and practitioners alike. The conference aims to give these various groups a chance to meet, engage in conversation through scheduled...

National Cyber Summit
NATIONAL CYBER SUMMIT
June 08-10, 2021
National Cyber Summit is the nation’s most innovative cyber security-technology event, offering unique educational, collaborative and workforce development opportunities for industry visionaries and rising leaders. NCS offers more value than similar cyber conferences with diverse focus-areas, ...

SPOTLIGHT

Global leaders in virtually all industries realize that they face a similar problem: providing a great employee experience that attracts quality employees and keeps them engaged and productive. Executives see the problem, but do they really understand it, and know how to fix it? The process starts w

NOV 25, 2020 | 10:00
HOW TO MITIGATE INSIDER SECURITY RISKS IN THE CURRENT LANDSCAPE
Insider security threats and risks remain both pervasive and complex, and never more so than in the current remote working paradigm amid the ongoing COVID-19 pandemic. Perhaps the most intriguing aspect of insider threats are their diverse and multi-faceted nature. Likewise, just as intricate are th...
DEC 03, 2020 | 9:00 AM
CYBER SECURITY 2 DAYS VIRTUAL LIVE TRAINING IN HALIFAX
Every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.
DEC 10, 2020 | 10:00
ENABLING SECURE ACCESS: ANYWHERE, ANY DEVICE AND ANY APPLICATION
In today’s world, it is necessary to have workers located at home as well as in the office, with managed, BYOD and IOT devices. At the same time, your data and applications could be located in your data center, in a cloud data center or many different locations through SaaS providers.
TOP SECURITY TRENDS FOR 2016-2017
During 2015, we've continued to see changes in cyber security for organizations. Threats are evolving, becoming increasingly sophisticated and more numerous. Traditional approaches to securing IT systems have expanded to include new requirements to meet the additional demands of operational tech...
BUSINESS EMAIL MASQUERADING: HOW HACKERS ARE FOOLING EMPLOYEES TO COMMIT FRAUD
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the greatest wire fraud worries. These schemes threaten to overshadow what was previously seen from commercial account takeover incidents.
CEO'S ROLE IN THE FIGHT AGAINST FRAUD
In today's era of digital fraud, CEOs need to have a thorough understanding of threats and risks as well as the urgency of properly assessing and responding to incidents. It is not IF but WHEN your organisation will suffer a security breach. Without this understanding and an ability to communica...
THE LEGAL ISSUES OF USING BIG DATA TO COMBAT FRAUD
More and more, instances of fraud are taking place in a digital context. A robust cyber security strategy therefore is essential. This insightful session will share an overview of the key regulatory steps that an organisation should take in order to achieve cyber security compliance as well as discu...
SUPPLY CHAIN SECURITY - THE FIRST AND WEAKEST LINK IN THE CHAIN?
Do you have a supply chain or just vendors? Do any or all of them present a breach potential? We apply massive resources to hardening perimeters and preventing infiltration of our information security systems, but what if our adversaries have a built-in presence and already have a foothold in the so...