New York

2017 National Homeland Security Conference

This conference was originally conceived of as an information sharing opportunity by the Charlotte and Southeast Florida Urban Areas who, along with other UASI programs, recognized a distinct need for an effective information sharing platform among UASI jurisdictions.

Cyber Investing Summit

The 2nd Annual Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products and services over the next five years from 2017 to 2021, according to Cybersecurity Ventures?s quarterly Cybersecurity Market Report.

Advanced Digital Forensics, Incident Response, and Threat Hunting

FOR508: Advanced Incident Response and Threat Hunting Course will help you to: Detect how and when a breach occurred Identify compromised and affected systems Determine what attackers took or changed Contain and remediate incidents Develop key sources of threat intelligence Hunt down additional breaches using knowledge of the adversary

RiskSec NY 2017

A destination for information and security professionals providing analysis on all of the latest cybersecurity issues from highly respected thought leaders.

Cyber Resolve

CyberVista understands that today?s leaders are tasked with protecting their company from all types of risk. Cybersecurity risk is one such risk and shouldn?t be relegating to the IT department. Corporate leaders and board members must have the expertise to ask and understand cybersecurity questions to lead their organizations toward a sturdy, resilient posture.

Intro to Information Security

This course is designed for students who have a basic knowledge of computers and technology but no prior knowledge of cyber security. The hands-on, step-by-step teaching approach will enable you to grasp all the information presented even if some of the topics are new to you. You’ll learn the fundamentals of information security that will […]

Health Care Security Essentials

Health Care Security Essentials is designed to provide attendees with an introduction to current and emerging issues in health care information security and regulatory compliance. The class provides a foundational set of skills and knowledge for students through the integration of case studies, hands-on labs, and defensible control considerations for securing and monitoring electronic protected […]

Intrusion Detection In-Depth

SEC503 is most appropriate for students who are or will become intrusion detection/prevention or security analysts, although others may benefit from the course as well. Students range all the way from seasoned analysts to novices with some TCP/IP background, but to keep pace with the class students are expected to have at least a basic […]

Continuous Monitoring and Security Operations

We continue to underestimate the tenacity of our adversaries! Organizations are investing a significant amount of time and financial and human resources trying to combat cyber threats and prevent cyber attacks, but despite this tremendous effort organizations are still getting compromised. The traditional perimeter-focused, prevention-dominant approach to security architecture has failed to prevent intrusions. No […]

Cybersecurity Seminar (The Leadership Imperative)

Cyber risk impacts every element of your organization ? and even the most brilliant information security expertise must be supported by a cross-functional cybersecurity structure and culture to succeed. Cybersecurity: The Leadership Imperative will provide case studies and actionable insights on building and maintaining a structure in which leaders across the organization are able to […]

2017 Speaker Series: Cybersecurity

Learn from area experts on best practices and how to ensure your company is protected. Presentations will give you practical skills you can take back to immediately implement in the workplace.

A Practical Introduction to Cyber Security Risk Management

In this course students will learn the practical skills necessary to perform regular risk assessments for their organizations. The ability to perform risk management is crucial for organizations hoping to defend their systems. There are simply too many threats, too many potential vulnerabilities that could exist, and simply not enough resources to create an impregnable […]

Network Penetration Testing and Ethical Hacking

As a cybersecurity professional, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you ready? SEC560, the flagship SANS course for penetration testing, fully arms you to address this duty head-on.

ISC WEST 2017

ISC WEST is THE largest security industry trade show in the U.S. At ISC West you will have the chance to meet with technical reps from 1,000+ exhibitors and brands in the security industry and network with over 28,000 security professionals.

Collaborate (Co-Located with InfoComm Connections New York)

Back by popular demand! This half-day conference addresses UCC trends and business challenges. A joint program by InfoComm International and IMCCA, panelists from the worlds of tech, finance, and government will speak on the challenges faced by CIOs and technology managers such as: how to build your collaboration rooms securely, choosing the best technology for […]

Securing New Ground Agenda

Brought to you by the Global Security Risk Management Alliance (GSRMA), this unique half-day forum provides a plain English translation of IT security concepts and actions so any Physical Security leader can effectively engage in a discussion of cybersecurity. Buzzwords will be explained and techno-babble demystified, enabling security practitioners to make better business decisions related […]

AWS Summit

Join Sophos at AWS Summit New York to learn about the AWS platform and how to offer existing customers information on architecture best practices and new services.

IT Roadmap

From rootkits to ransomware, old school security tools and strategies can’t keep pace with today?s advanced attacks. To be effective, you need to thwart the attack methods of advance persistent threats, leverage next-generation endpoint and network security intelligence to detect and isolate attacks, and address critical alerts them with contextual security intelligence. Join us to […]

President Obama Seeks $75M for Police Body-Worn Cameras

Spurred by the Ferguson, Missouri shooting, President Barack Obama is calling for $75 million in federal spending to get 50,000 more police to wear body cameras that record their interactions with civilians. The package includes $75 million for to help pay for the small, lapel-mounted cameras to record police on the job, with state and local governments paying half the cost.

ISC East 2014 Presents New Mass Evacuation and Notification Sessions

ISC East, the largest security event in the Northeast United States, announced today a new addition to the educational program at this year?s conference: a three-session program called ?Demystifying the Mass Evacuation and Notification Market.? The new program will be held Wednesday, Nov. 19 at New York?s Javits Center during the 2014 ISC East conference and is offered free to those interested in understanding the market demands and opportunities.