The convergence of physical and IT security is forcing security professionals to rethink the way they provide —and many times design and maintain— products, systems and services. Whether you are an integrator, consultant, end-user or supplier/manufacturer, SecurityNext is here to help you navigate, leverage and profit from the latest technologies, trends and products to stay […]
Check Point Software has been around for many years now so the event that is organized by them will surely be a success. This event is ideal for malware researchers.
CPX 360 promises to be premier cyber security summit. CPX 360 is where you’ll receive up-to-the-minute intelligence about global threats and other vital topics from the world’s leading cyber security experts. In addition, you’ll enjoy getting hands on with cutting-edge security solutions from Check Point, networking with your peers, and celebrating with the world’s cyber […]
The CPX 360 cybersecurity conference is the place to tackle your toughest security challenges, gain important new strategies, and expand your network. Explore the latest technology through immersive, hands-on experiences designed by Check Point and ecosystem partners. Participate in interactive technical breakout sessions, masterclasses, and more to raise your defence capabilities against the growing wave […]
SANS has joined forces with industry leaders to equip security professionals and control system engineers with the cybersecurity skills they need to defend national critical infrastructure. ICS410: ICS/SCADA Security Essentials provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting […]
SecurityNext 2020 is designed to help you navigate, leverage and profit from the latest technologies, trends and products to stay ahead of the competition and improve your bottom line. Our Editorial Advisory Board is guiding content for our expanded educational program coming in September. Members of the advisory board include some of the top thought […]
If you’re looking for DistribuTECH logistics info such as when things happen, who is at the event or just want to sign up to receive more details via email, you’ve come to the 100% best page on the entire internet. Enjoy getting what you need.
FloCon focuses on applying analytics to ANY large-scale dataset to enhance security, not just network flow data. Everyone who is interested in data-driven security is invited to attend this conference. We are particularly interested in new, innovative ways to use Big Data to address thorny security problems.
SANS, along with Threat Hunting & Incident Response Summit founding partner Carbon Black is excited to bring together prominent security practitioners for two days of in-depth talks focused on techniques that can be used to successfully identify, contain, and eliminate adversaries targeting your networks. As an attendee, you’ll walk away from this Summit with new […]
The Security Operations Summit brings together prominent security practitioners for two days of in-depth talks and panel discussions around building, operating, and maturing a successful security operations program. Speakers will share their latest strategies and methods for achieving impactful operational functions, including network monitoring, incident response, threat intelligence, forensics, self-assessment, and the command center. Summit […]
For over twenty years, the Colloquium for Information Systems Security Education (CISSE) has been the sole forum in which the members of the academic field of cybersecurity have gathered to present and discuss new ideas. CISSE was first established to provide a single place to conduct productive conversations between a variety of government, industry, and […]
Join us for NolaCon 2018, an Information Security/Hacker conference for professionals and enthusiasts alike located in New Orleans very own French Quarter, offering talks and training as well interesting and inventive sessions and workshops. The sessions will cover a variety of topics focused on today’s infosec climate, malware, exploits, vulnerabilities, social engineering, and forensics are […]
Learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that you can directly apply when you get back to work. Learn tips and tricks from the experts so that you can win the battle against the wide range of cyber adversaries that want to harm your environment.
Even if you’ve only been involved in Cybersecurity for a short period of time you’ll likely heard of SANS. SANS courses, their training and conferences have a very high regard within the community. This event taking place in New Orleans will be no exception.
The New Orleans Cyber Security Conference features 40-60 vendor exhibits and 8-12 educational speaker sessions discussing current cyber-security issues such as cloud security, email security, VoIP, LAN security, wireless security & more. We give away numerous prizes including cash and gift cards up to $100, the latest tech gadgets and much more! You’ll come away […]
What perils should you be anticipating? Are you gambling with your principal’s safety at home, in the workplace, on the road?
Active shooter and workplace violence incidents have steadily increased and become more deadly over the past few years. In addition to the growing number of violent incidents, the number of casualties involved in these events is also growing at an alarming rate. It is a fact that Soft Targets (small businesses, hospitals, schools, sporting venues, […]
What makes a risk, threat, and vulnerability assessment successful and effective? Why are assessments essential for organizational resilience? This program starts by explaining the differences between risk, threat, and vulnerability and then demonstrates how assessments are absolutely essential for organizational resilience.
Whether you’re new to a security leadership position, striving to increase your management responsibility, or have 20 years experience as a security manager, your ability to manage a modern security force depends on your understanding of the law, management practices, technology, and best practices and procedures. This program delivers a comprehensive update on these core […]
Internal workplace investigations—a critical management tool necessary in today’s complex business climate—are routinely conducted by organizations of every size. Though the objectives and scope of these undertakings vary widely, their principle purpose is unbiased fact-finding that leads to objective results. Only a properly conducted investigation can withstand today’s intense scrutiny.