(ISC)2 Think Tank Webinar Smelling the Roses at 100Gb - Security Tooling
at the Speed of LifeFerris Bueller famously said, “Life moves pretty
fast. If you don’t stop to look around once in a while, you could miss
it.” With complex data flows now reaching ...
Upcoming (ISC)2 webinar. Earn 1 CPE. Detecting & Preventing Threat
Evasions Techniques – 2019 And BeyondCyber-attacks and the threat actors
behind them are becoming more and more sophisticated. Today’s attackers
adopt existing techniques, modify them and ...
Join Cofense and (ISC)2 for the first Think Tank webcast of the year on
Thursday, Jan 17, 2019 at 1PM Eastern for "Employing Users as Your
Quality Control". Process automation delivers a lot of promises. A car
can be assembled in less than a day and veget...
Join (ISC)² on Thursday, Nov 8, 2018 at 1PM Eastern. Email and the Web –
Defending Against Attackers’ Favorite Vectors According to the Verizon
Data Breach Investigations Report 2018, 99% of malware, such as
ransomware, trojans, and RATs, were delivered v...
Security Briefings Webcast Someone in leadership always seems to ask the
question “How can I tie my threat hunting activities to real impacts for
the organization?” Threat hunting programs are encouraged as part of a
mature and successful incident respons...
Imagine what a security analyst could deduce if they had visibility into
all the common applications flowing through their network. They could
optimize the data being sent to security tools, correlate information
across the various protocols to determine ...
(ISC)2 and CSA present Taming the Cloud Together - CCSP & CCSK Cloud
Certification Synergy on Tuesday, June 12, 2018 at 1 PM Eastern. Certain
things go together to make the sum of their parts that much better.
Peanut Butter and Jelly. Lennon and McCartney...
Webcast - Organizational Dynamics of Information Security Positioning
Information Security within the enterprise presents its own set of
challenges. Our recent survey data from hundreds of senior security and
IT leaders like you uncovered a number of syst...
While TLS (formerly known as SSL) has become the de facto way of
encrypting data in motion on networks, it can also hide threats from
your InfoSec team. As the volume of encrypted traffic continues to grow,
organizations become even more vulnerable to enc...
Join us for our next webcast November 16, 2017 at 12:00PM (Noon) Eastern
- Exchanging Cyber Threat Intelligence: There has to be a Better Way.
Today’s increasingly complex and stealthy threats are causing
organizations difficultly in defending against the...