Please enable JavaScript
Email Marketing by Benchmark
  • Sophos Advanced Endpoint Security Administrator Webinar

    This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of […]

  • Getting Started with Sophos UTM – NA

    This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of […]

  • Sophos Advanced UTM Administrator Webinar

    This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of […]

  • Sophos Advanced Endpoint Security Administrator Webinar

    This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of […]

  • Getting Started with Sophos UTM – NA

    This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of […]

  • Sophos Advanced UTM Administrator Webinar

    This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of […]

  • Sophos Advanced Endpoint Security Administrator Webinar

    This webinar provides a administrator-level technical understanding of Sophos UTM, through Sophos certified course material and live demonstration. This course is designed for anyone who has had exposure to the Sophos UTM and wishes to increase their technical understanding of the product and become a Sophos Certified Engineer. This course equips students with knowledge of […]

  • TRENDnet’s New 2.5G Web Smart Switches

    Webinar

    Please join us as we discuss TRENDnet's new Web Smart 2.5G switches. Learn about the technical benefits that 2.5G technology can bring to your network, and see how they can be used in real world network solutions. 24, 2018 7:30 PM - 8:30 PM IST

  • Pathway to Violence: Recognize and Identify

    How to recognize and identify potential threats in your workplace that precede an attack. This webinar references the Department of Homeland Security?s Pathway to Violence model and applies it to the workplace.

  • What?s the Big Deal About Recertification?

    As an ASIS-certified professional, you?ve made a commitment to stay current in the field through continuing education activities ? as is required for all accredited certification programs. To maintain your certification, you are required to recertify your designation every three years by completing 60 CPEs.

  • Leveraging IT for Security: The Evolution of Continuous Assurance, Automation & Presence Control

    Opportunities to mitigate risks inside an organization abound using modernized security technology. While it requires a more comprehensive understanding of IT concepts, learn about the history of the technology evolution in security and where it is headed. Discuss ways to strengthen the protection of the corporate security system in a changing office environment using continuous […]

  • Hostile Surveillance Detection Training

    We know that ISIS has been operating in all 50 U.S. States and many other countries. We also know that terrorist organizations have a planning cycle which includes conducting hostile surveillance for weeks, months and even years prior to an attack. This seminar will inform participants on the terrorist planning cycle, what hostile surveillants look […]

  • The Importance of Risk Literacy in Security

    With the increased importance of finding efficiency in today?s complex and competitive business environment, the use of a risk-based approach has found its way into nearly all vertical markets. This presentation will explore the positive and negative influences that the application of risk has had on the security industry, while outlining common fallacies in the […]

  • Situational Awareness and Detecting Pre-Attack Indicator(s)

    Situational Awareness requires observation (seeing something), but it also requires an interpretation of what has been observed. This interpretation can then allow for the prediction of potential outcomes. The better the observer?s expertise on what has been observed, the more effective the interpretation and prediction.

  • Security Convergence in the US, Europe, and India: Survey Results

    14 January 2020 10:00-11:00ET The ASIS Foundation recently conducted a landmark study on the convergence of physical security, cybersecurity, and business continuity. Find out who is converging, why, and how. Learn the advantages and drawbacks of convergence, as well as how factors such as organization size, geography, sector, and culture weigh into the equation.