Unmanned Security Expo New York is an all-new, trade-only event focused on UAS and UGV technology and hardware. Restricted to qualified professionals sourcing or providing autonomous solutions in commercial and government security and safety, drone detection/counter-system applications, updates and education in UAV regulations, and more.
For over the past 10 years Steven has built and matured security operations, and hunt teams for companies across the globe. Steven Wimmer has provided strategic and operational consulting to over 20 companies globally, including end to end SOC builds, hunt teams, and incident response. Prior to his role as Senior Technical Account Manager at […]
Learn and network while exploring and experiencing the latest platforms, leading-edge technologies and state-of-the-art networking capabilities that support the Sea Services’ operations.
The fourth annual Atlanta Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Security BSides is the first grass roots, DIY, open security conference in the world! Security BSides is a great combination of two event styles: structured anchor events and grass-roots geocentric events.
Data Connectors is proud to host the Cybersecurity Strategies Conference. Includes Keynote Session and CISO Panel
Devopsdays is coming back to Charlotte!
If you’re looking for DistribuTECH logistics info such as when things happen, who is at the event or just want to sign up to receive more details via email, you’ve come to the 100% best page on the entire internet. Enjoy getting what you need.
Security in the healthcare industry is in a higher risk state than almost any other industry. Medical Devices and associated systems are especially vulnerable. Recent attacks on healthcare and multiple new vulnerabilities discovered highlight the need to make meaningful improvements. This year’s theme is “Take Action,” creating actionable ideas relevant to attendees to bring back […]
The collection, classification, and exploitation of knowledge about adversaries – collectively known as cyber threat intelligence – gives network defenders information superiority that is used to reduce the adversary’s likelihood of success with each subsequent intrusion attempt. Responders need accurate, timely, and detailed information to monitor new and evolving attacks, as well as methods to […]