Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 218
Sort by

Event
St. Louis: Security Is a Layered Approach, Starting with Pen Testing

Description Everyone always wants to talk about cybersecurity like it is an onion, with many layers to be peeled back. If we are being honest with ourselves, we know nobody really wants to take a big bite out of an onion. Why? All you get is more onion! We see cybersecurity as a tootsie roll...

 02-05-2019 | 12:00 - 13:30 CT
 St. Louis MO


Event
Little Rock: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 02-12-2019 | 12:00 - 13:30 CT
 Little Rock AR


Event
Denver: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 02-07-2019 | 12:00 - 13:30 MT
 Denver CO


Event
Dallas: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 02-05-2019 | 12:00 - 13:30 CT
 Dallas TX


Event
Cleveland: Cyberthreat - An FBI Perspective

Description Please join us for lunch as a Supervisory Special Agent from the local FBI office provides an overview of cyber trends and recent cybersecurity directives, describes the threat landscape, and discusses the government response to cyber-intrusions. Speaker Richard Florence -...

 01-22-2019 | 11:45 - 13:00 ET
 Cleveland OH


Event
New York City: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-09-2019 | 12:00 - 13:30 ET
 New York NY


Event
Indianapolis: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-10-2019 | 12:00 - 13:30 ET
 Indianapolis IN


Event
Chicago: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-15-2019 | 12:00 - 13:30 CT
 Chicago IL


Event
Phoenix: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-10-2019 | 12:00 - 13:30 MT
 Phoenix AZ


Library Entry
Life After General Data Protection Regulation (GDPR)

You've prepared, designed and implemented your GDPR programs. Now what? In this webinar, we will key in on how firms are facing it, dealing with it and adjusting to its requirements. Specifically, how firms review the management and ongoing processes of GDPR programs. Speakers: Paola Zeni -...

2 attachments

ILTA Video's profile image