Events Search and Views Navigation
As your enterprise moves to the cloud, you need to develop a holistic cloud security strategy. Should you adopt tools developed and provided by cloud platform providers, or is it better to invest in third-party offerings? Now you can discover cutting-edge strategies from industry leaders and leverage best practices to easily secure your cloud investments.Find out more »
IT supply chain is vital yet highly volatile. The highly anticipated revision 5 of NIST SP 800-53 has a control family dedicated to supply chain risk management. While most anticipated COVID-19 to significantly disrupt the IT supply chains, CompTIA found that they remained resilient. Join us in our IT Supply Chain Virtual Conference to hear about risks and leading practices in this critical space. Attendees of this event will receive four (4) CPEs. Click Here to Register TOPICS Importance of…Find out more »
Theresa Payton, leading cybersecurity expert and first female Whitehouse CIO, discusses her book "Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth."
Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots.Find out more »
As the global threat from distributed denial of service attacks impact hospitals, eduction, government, and enterprise; what are questions and considerations we can make that truly measure the capabilities of a DDoS Protection Provider? We will discuss threat mitigation, volumetric attack mitigation, SSL protection capabilities, and capacity planning.Find out more »
This session focuses How to Do Application Security Right with Author Ted HarringtonFind out more »