Search

Login to see all site content available based on your status. An active member status provides access to members-only content.

1 to 10 of 291
Sort by

Event
Charleston: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-23-2019 | 12:00 - 13:30 ET
 Charleston WV


Event
Vermont: Ask the Expert - Infrastructure and Security with the CEO of Conversant Group

Description Please join us for an open discussion with John Anthony Smith, the CEO of Conversant Group. We'll enjoy a catered lunch with our colleagues and learn all we can from John. To make the most of this great opportunity to get direct feedback from an industry leader, bring along your...

 02-26-2019 | 12:00 - 13:00 ET
 Burlington VT


Event
Cleveland: Cyberthreat - An FBI Perspective

Description Please join us for lunch as a Supervisory Special Agent from the local FBI office provides an overview of cyber trends and recent cybersecurity directives, describes the threat landscape, and discusses the government response to cyber-intrusions. Speaker Richard Florence -...

 01-22-2019 | 11:45 - 13:00 ET
 Cleveland OH


Event
New York City: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-09-2019 | 12:00 - 13:30 ET
 New York NY


Event
Louisville: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-09-2019 | 12:00 - 13:30 ET
 Louisville KY


Event
Indianapolis: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-10-2019 | 12:00 - 13:30 ET
 Indianapolis IN


Event
Chicago: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-15-2019 | 12:00 - 13:30 CT
 Chicago IL


Event
Phoenix: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 01-10-2019 | 12:00 - 13:30 MT
 Phoenix AZ


Library Entry
Outside Counsel Guidelines: Workflow for Compliance

Many firms lose revenue because their bills are not in compliance with billing guidelines. Outside counsel guidelines (OCG) compliance has a direct and immediate impact on your bottom line. When bills are not in compliance, invoices are rejected and money is left on the table. Despite this,...

Outside Counsel Guidelines.mp4

ILTA Video's profile image

Event
Miami: Security - Recognize a Targeted Attack from the Defender's Point of View

Description We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an...

 12-12-2018 | 12:00 - 13:30 ET
 Miami FL