New York
2017 National Homeland Security Conference
This conference was originally conceived of as an information sharing opportunity by the Charlotte and Southeast Florida Urban Areas who, along with other UASI programs, recognized a distinct need for an effective information sharing platform among UASI jurisdictions.
Cyber Investing Summit
The 2nd Annual Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products and services over the next five years from 2017 to 2021, according to Cybersecurity Ventures?s quarterly Cybersecurity Market Report.
Advanced Digital Forensics, Incident Response, and Threat Hunting
FOR508: Advanced Incident Response and Threat Hunting Course will help you to: Detect how and when a breach occurred Identify compromised and affected systems Determine what attackers took or changed Contain and remediate incidents Develop key sources of threat intelligence Hunt down additional breaches using knowledge of the adversary
RiskSec NY 2017
A destination for information and security professionals providing analysis on all of the latest cybersecurity issues from highly respected thought leaders.
Cyber Resolve
CyberVista understands that today?s leaders are tasked with protecting their company from all types of risk. Cybersecurity risk is one such risk and shouldn?t be relegating to the IT department. Corporate leaders and board members must have the expertise to ask and understand cybersecurity questions to lead their organizations toward a sturdy, resilient posture.
Intro to Information Security
This course is designed for students who have a basic knowledge of computers and technology but no prior knowledge of cyber security. The hands-on, step-by-step teaching approach will enable you to grasp all the information presented even if some of the topics are new to you. You’ll learn the fundamentals of information security that will […]
Health Care Security Essentials
Health Care Security Essentials is designed to provide attendees with an introduction to current and emerging issues in health care information security and regulatory compliance. The class provides a foundational set of skills and knowledge for students through the integration of case studies, hands-on labs, and defensible control considerations for securing and monitoring electronic protected […]
Intrusion Detection In-Depth
SEC503 is most appropriate for students who are or will become intrusion detection/prevention or security analysts, although others may benefit from the course as well. Students range all the way from seasoned analysts to novices with some TCP/IP background, but to keep pace with the class students are expected to have at least a basic […]
Continuous Monitoring and Security Operations
We continue to underestimate the tenacity of our adversaries! Organizations are investing a significant amount of time and financial and human resources trying to combat cyber threats and prevent cyber attacks, but despite this tremendous effort organizations are still getting compromised. The traditional perimeter-focused, prevention-dominant approach to security architecture has failed to prevent intrusions. No […]
Cybersecurity Seminar (The Leadership Imperative)
Cyber risk impacts every element of your organization ? and even the most brilliant information security expertise must be supported by a cross-functional cybersecurity structure and culture to succeed. Cybersecurity: The Leadership Imperative will provide case studies and actionable insights on building and maintaining a structure in which leaders across the organization are able to […]
2017 Speaker Series: Cybersecurity
Learn from area experts on best practices and how to ensure your company is protected. Presentations will give you practical skills you can take back to immediately implement in the workplace.
A Practical Introduction to Cyber Security Risk Management
In this course students will learn the practical skills necessary to perform regular risk assessments for their organizations. The ability to perform risk management is crucial for organizations hoping to defend their systems. There are simply too many threats, too many potential vulnerabilities that could exist, and simply not enough resources to create an impregnable […]
Network Penetration Testing and Ethical Hacking
As a cybersecurity professional, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you ready? SEC560, the flagship SANS course for penetration testing, fully arms you to address this duty head-on.
ISC WEST 2017
ISC WEST is THE largest security industry trade show in the U.S. At ISC West you will have the chance to meet with technical reps from 1,000+ exhibitors and brands in the security industry and network with over 28,000 security professionals.
Collaborate (Co-Located with InfoComm Connections New York)
Back by popular demand! This half-day conference addresses UCC trends and business challenges. A joint program by InfoComm International and IMCCA, panelists from the worlds of tech, finance, and government will speak on the challenges faced by CIOs and technology managers such as: how to build your collaboration rooms securely, choosing the best technology for […]
Securing New Ground Agenda
Brought to you by the Global Security Risk Management Alliance (GSRMA), this unique half-day forum provides a plain English translation of IT security concepts and actions so any Physical Security leader can effectively engage in a discussion of cybersecurity. Buzzwords will be explained and techno-babble demystified, enabling security practitioners to make better business decisions related […]
AWS Summit
Join Sophos at AWS Summit New York to learn about the AWS platform and how to offer existing customers information on architecture best practices and new services.
IT Roadmap
From rootkits to ransomware, old school security tools and strategies can’t keep pace with today?s advanced attacks. To be effective, you need to thwart the attack methods of advance persistent threats, leverage next-generation endpoint and network security intelligence to detect and isolate attacks, and address critical alerts them with contextual security intelligence. Join us to […]