Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 296
Sort by

Library Entry
Information Governance Discussion: Compliance, Retention, Destruction and Disposal

We hope you'll join us for this virtual roundtable as we discuss a variety of information governance (IG) topics including: Compliance refers to being in accordance with established guidelines/specifications or the process of becoming so, and can encompass efforts to abide by both industry...

Compliance Retention Destruction.mp4

ILTA Video's profile image

Event
St. Louis: Security Is a Layered Approach, Starting with Pen Testing

Description Everyone always wants to talk about cybersecurity like it is an onion, with many layers to be peeled back. If we are being honest with ourselves, we know nobody really wants to take a big bite out of an onion. Why? All you get is more onion! We see cybersecurity as a tootsie roll...

 02-05-2019 | 12:00 - 13:30 CT
 St. Louis MO


Event
Nashville: Layered Security Approach

Description Everyone always wants to talk about cybersecurity like it is an onion, with many layers to be peeled back. If we are being honest with ourselves, we know nobody really wants to take a big bite out of an onion. Why? All you get is more onion! We see cybersecurity as a tootsie roll...

 02-12-2019 | 12:00 - 13:30 CT
 Nashville TN


Event
Little Rock: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 02-12-2019 | 12:00 - 13:30 CT
 Little Rock AR


Event
Denver: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 02-07-2019 | 12:00 - 13:30 MT
 Denver CO


Event
Dallas: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 02-05-2019 | 12:00 - 13:30 CT
 Dallas TX


Event
Charleston: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-23-2019 | 12:00 - 13:30 ET
 Charleston WV


Event
Vermont: Ask the Expert - Infrastructure and Security with the CEO of Conversant Group

Description Please join us for an open discussion with John Anthony Smith, the CEO of Conversant Group. We'll enjoy a catered lunch with our colleagues and learn all we can from John. To make the most of this great opportunity to get direct feedback from an industry leader, bring along your...

 02-26-2019 | 12:00 - 13:00 ET
 Burlington VT


Event
Cleveland: Cyberthreat - An FBI Perspective

Description Please join us for lunch as a Supervisory Special Agent from the local FBI office provides an overview of cyber trends and recent cybersecurity directives, describes the threat landscape, and discusses the government response to cyber-intrusions. Speaker Richard Florence -...

 01-22-2019 | 11:45 - 13:00 ET
 Cleveland OH


Event
New York City: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-09-2019 | 12:00 - 13:30 ET
 New York NY