Upcoming Events › Cybersecurity
Events Search and Views Navigation
As your enterprise moves to the cloud, you need to develop a holistic cloud security strategy. Should you adopt tools developed and provided by cloud platform providers, or is it better to invest in third-party offerings? Now you can discover cutting-edge strategies from industry leaders and leverage best practices to easily secure your cloud investments.Find out more »
IT supply chain is vital yet highly volatile. The highly anticipated revision 5 of NIST SP 800-53 has a control family dedicated to supply chain risk management. While most anticipated COVID-19 to significantly disrupt the IT supply chains, CompTIA found that they remained resilient. Join us in our IT Supply Chain Virtual Conference to hear about risks and leading practices in this critical space. Attendees of this event will receive four (4) CPEs. Click Here to Register TOPICS Importance of…Find out more »
Theresa Payton, leading cybersecurity expert and first female Whitehouse CIO, discusses her book "Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth."
Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots.Find out more »
This session focuses How to Do Application Security Right with Author Ted HarringtonFind out more »