New York
2017 National Homeland Security Conference
This conference was originally conceived of as an information sharing opportunity by the Charlotte and Southeast Florida Urban Areas who, along with other UASI programs, recognized a distinct need for […]
Cyber Investing Summit
The 2nd Annual Cyber Investing Summit is an all-day conference focusing on investing in the cyber security industry, which is predicted to exceed $1 trillion in cumulative spending on products […]
RiskSec NY 2017
A destination for information and security professionals providing analysis on all of the latest cybersecurity issues from highly respected thought leaders.
Cyber Resolve
CyberVista understands that today?s leaders are tasked with protecting their company from all types of risk. Cybersecurity risk is one such risk and shouldn?t be relegating to the IT department. […]
Cybersecurity Seminar (The Leadership Imperative)
Cyber risk impacts every element of your organization ? and even the most brilliant information security expertise must be supported by a cross-functional cybersecurity structure and culture to succeed. Cybersecurity: […]
2017 Speaker Series: Cybersecurity
Learn from area experts on best practices and how to ensure your company is protected. Presentations will give you practical skills you can take back to immediately implement in the […]
Advanced Digital Forensics, Incident Response, and Threat Hunting
FOR508: Advanced Incident Response and Threat Hunting Course will help you to: Detect how and when a breach occurred Identify compromised and affected systems Determine what attackers took or changed […]
Intro to Information Security
This course is designed for students who have a basic knowledge of computers and technology but no prior knowledge of cyber security. The hands-on, step-by-step teaching approach will enable you […]
Health Care Security Essentials
Health Care Security Essentials is designed to provide attendees with an introduction to current and emerging issues in health care information security and regulatory compliance. The class provides a foundational […]
Intrusion Detection In-Depth
SEC503 is most appropriate for students who are or will become intrusion detection/prevention or security analysts, although others may benefit from the course as well. Students range all the way […]
Continuous Monitoring and Security Operations
We continue to underestimate the tenacity of our adversaries! Organizations are investing a significant amount of time and financial and human resources trying to combat cyber threats and prevent cyber […]
A Practical Introduction to Cyber Security Risk Management
In this course students will learn the practical skills necessary to perform regular risk assessments for their organizations. The ability to perform risk management is crucial for organizations hoping to […]
Network Penetration Testing and Ethical Hacking
As a cybersecurity professional, you have a unique responsibility to find and understand your organization’s vulnerabilities and to work diligently to mitigate them before the bad guys pounce. Are you […]
ISC WEST 2017
ISC WEST is THE largest security industry trade show in the U.S. At ISC West you will have the chance to meet with technical reps from 1,000+ exhibitors and brands […]
Securing New Ground Agenda
Brought to you by the Global Security Risk Management Alliance (GSRMA), this unique half-day forum provides a plain English translation of IT security concepts and actions so any Physical Security […]
Collaborate (Co-Located with InfoComm Connections New York)
Back by popular demand! This half-day conference addresses UCC trends and business challenges. A joint program by InfoComm International and IMCCA, panelists from the worlds of tech, finance, and government […]
AWS Summit
Join Sophos at AWS Summit New York to learn about the AWS platform and how to offer existing customers information on architecture best practices and new services.
IT Roadmap
From rootkits to ransomware, old school security tools and strategies can’t keep pace with today?s advanced attacks. To be effective, you need to thwart the attack methods of advance persistent […]
