Denver 2019
Course Topics: Cyber Defense, Ethical Hacking, PowerShell, Penetration Testing, Critical Security Controls, Mobile Device Security, Digital Forensics, Security Management, ICS Security
Course Topics: Cyber Defense, Ethical Hacking, PowerShell, Penetration Testing, Critical Security Controls, Mobile Device Security, Digital Forensics, Security Management, ICS Security
Choose from Eight Courses Covering: Cyber Defense, Cloud Security, Digital Forensics, Security Management, ICS Security
ISC East is the premier security event in the Northeast for the physical, IT and IoT security, with exhibits covering Video Surveillance, Access Control, Biometrics, Distributors, Public Security, Smart Home, Unmanned Security, and more! ISC East allows for networking with 225+ exhibitors and brands, and 5,000 industry professionals, as well as free education provided by […]
This event is aimed at professionals who love quantum computing. If you want to hear the quantum threats happening in the world today, we encourage you to attend.
Threats approach from every direction and SANS delivers reliable, professional information security training for every member of your organization ? leaving no one unprepared.
SANS is recognized as the best place to develop the deep, hands-on cybersecurity skills most needed right now. SANS Threat Hunting London Summit & Training 2020 will be an immersion training that will provide attendees with the skills to defend organizations against security breaches and prevent future attacks. Choose from 7 courses.
SANS is recognised around the world as the best place to develop the deep, hands-on cybersecurity skills most needed right now. Join us for SANS Threat Hunting & IR London - Summit & Training 2020 (January 13 - 19 at the Park Plaza Victoria London).
Threats approach from every direction and SANS delivers reliable, professional information security training for every member of your organization ? leaving no one unprepared.
14 January 2020 10:00-11:00ET The ASIS Foundation recently conducted a landmark study on the convergence of physical security, cybersecurity, and business continuity. Find out who is converging, why, and how. Learn the advantages and drawbacks of convergence, as well as how factors such as organization size, geography, sector, and culture weigh into the equation.
This webinar is the second installment of the ASIS Supply Chain and Transportation Security Council's 3-part series. Part one originally aired 27 March 2019 and is available on-demand in The Learning Exchange.
The ASIS Supply Chain and Transportation Security Council's webinar series continues its focus on the drivers for more robust industry standards (TAPA & CTPAT) and geopolitical security risks in the supply chain and transit security.
JANUARY 2020 PVMS Technical Certification Training, January 16-17, 2020, LENSEC HQ, Houston, TX
Earning one or more accredited security certifications from ASIS International brings personal and professional satisfaction and opens the door to career advancement, higher earnings potential, and more. The APP is a great way to begin!
The collection, classification, and exploitation of knowledge about adversaries - collectively known as cyber threat intelligence (CTI) - gives security practitioners information superiority that is used to reduce an adversary's likelihood of success. Responders and defenders leverage accurate, timely, and detailed threat intelligence to monitor new and evolving attacks and subsequently adapt their security posture.
Threats approach from every direction and SANS delivers reliable, professional information security training for every member of your organization ? leaving no one unprepared.