eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
Cyber threats come in all shapes and sizes. They may be the work of financially motivated actors, or foreign nation-states. They can be designed to be destructive and traumatic, or subtle and clandestine. Without having access to the relevant threat intelligence you need, it can be dif...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
A hospital is forced to divert patients. A school cancels classes. A city is unable to access local residents’ utility accounts… Ransomware can cause all sorts of disruption. Just how severe may depend on what you do both before and after a ransomware actor strikes.
This eSummit wil...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
While the concept of zero trust has increasingly been embraced in cyber circles, there is still a lot of work that needs to be done so that organizations can speed up their adoption rates and mature their ZTA models.
This eSummit virtual conference will examine how to hopefully inci...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
In the scramble to migrate their assets, services and applications to the cloud over the last few years, organizations have no doubt stumbled through their share of missteps along the way. But we have all collectively learned from these errors, and thus have come to a better understand...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
For every vendor, service provider or supply-chain partner your company does with, you are potentially introducing risk into your ecosystem. And so as these relationships mature through the third-party lifecycle, it’s important that your business responsibly assesses and minimizes the ...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
Identity is the new perimeter. So don’t be a “Woulda Coulda Shoulda.” It’s time to innovate in IAM before you fall behind the curve. Inaction and inertia are your enemy.
This eSummit virtual conference will look at the promising opportunities that await those organizations that stra...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
Don’t leave your devices to their own devices. After all, cyber adversaries turn any endpoint – phones, computers, virtual machines, embedded devices, servers, printers, POS terminals, etc. – into an entry point into your organization.
This eSummit will examine the ins and outs of e...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
The phrase “Ignorance is bliss” does not apply to cybersecurity.
The more you know about the risks that threaten your organization, the better. Which means you need reliable sources, credible feeds and collaborative industry partners willing to share. You also need to be able to fil...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
Whatever ransomware groups can do to ratchet up the pressure even more on their victims, they’ll do it. That might mean contacting individuals directly about their breached data, making stolen data searchable on their extortion websites, or adding a data wiping or DDoS component to the...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
Patch Tuesday? More like Patch Every Day. There’s always something in your network environment that needs fixing, whether it’s an actively exploited zero-day bug that was just identified in a critical advisory or a longstanding vulnerability that you’ve been meaning to get around to ev...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
Arguably no event in recent memory has had a greater impact on how cybersecurity is currently practiced than the rapid adoption of cloud-based services, especially after many corporate workforces went remote in 2020.
These days, everything a business needs is available via the cloud...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
In a perfect world, we’d only ever need a prevention strategy, because it would work 100 percent of the time. But reality is far from perfect, and so incident response has become an equally important counterpart to prevention.
And there’s plenty that goes into it: digital forensics ...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
The identity and access management solutions market has seen a dizzying array of activity over the last year. IAM is hot and adoption rates are soaring. And some companies have truly taken IAM to the next level, excelling at incorporating IAM technologies and policies into their day-to...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
The 2022 ransomware attacks against Costa Rica and Montenegro showed how entire countries can now be thrown into disarray as life-sustaining services become disabled. And the Colonial Pipeline incident demonstrated how critical infrastructure is not even out of bounds for attackers. Th...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
Depending on whom you ask, zero trust appears to be passing the credibility test. Despite continued misconceptions around zero trust architectures, the principles of “least privilege” and “never trust, always verify” have caught on as a bona fide approach to minimizing the risk of a da...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
Staying proactive in the fight against cybercriminal activity requires constant vigilance, and also a commitment to continually improve your threat hunting methodologies. A quick scouring of your environment won’t do. You need to look harder, probe further. You must map out the nooks a...
More info eSummit
Earn up to 6.5 CPE credits by attending this virtual event.
Regardless of how securely your data resides within your internal organization, you are left exposed by your third-party business relationships. Upstream supply chain partners, cloud-based service providers, third-party programming code – these are all sources of risk.
This eS...
More info