Back to Search Begin New Search Save Search Auto-Notify
Accelerate Compute; Scaling Out to the Edge
New accelerated computing infrastructure provides significant advantages for drug discovery, industrial automation, the retail industry, autonomous driving, and enterprise machine learning operations. Supermicro provides the infrastructure building blocks to make it all possible.
December 13, 2022
Organizer: Supermicro
Location: Webcast
Add Favorite
Red Hat Enterprise Linux Workshop
Join Red Hat® for a hands-on technical workshop and learn how Red Hat Enterprise Linux® can help you deploy, manage, and innovate on a platform that will meet your needs today and scale for the future. Today, IT organizations must maintain the status quo and keep an eye on the future. Delivering value to the business means being able to deliver services and applications quickly while maintaining the infrastructure already in place. Red...
December 13, 2022
Organizer: Red Hat
Location: Virtual
Add Favorite
Can You Hack It? An Expert View on Cybe...
Join us for a roundtable conversation with leading cybersecurity expert, Andrew Gorecki, the author of Cyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk. Andrew spent several years in the trenches of breach response leading large-scale investigations and remediation for Fortune 500 companies and is eager to share his learnings. During the session, Andrew will cover the following topics: The evolution...
December 13, 2022
Organizer: Red Hat
Location: Mountain View, CA
Add Favorite
How to Protect Your Organization from I...
Cyber attacks from external sources aren’t the only threats organizations must consider nowadays. Malicious and negligent employees, some with stolen credentials, have become a serious and growing security risk to organizations today. Insider threat incidents have risen 44% over the past two years with the per-incident cost averaging $15M. And even IT workers are being actively recruited from ransomware groups like Lapsus$ to access comp...
December 13, 2022
Organizer: Constella Intelligence
Location: Webcast
Add Favorite
Spyware for Sale: The Growing Threat to...
The monetized world of cybercrime is not a new concept, and until recently the highly technical malware did not reach into the mobile world. But like everything else, that has changed. Cybercriminals see the widely adopted frontier of mobile as a valuable target for increasingly advanced malware and services, and for the right price, are ready to sell to anyone. Advanced mobile malware, like spyware, is no longer a product just for nation stat...
December 13, 2022
Organizer: Zimperium
Location: Webcast
Add Favorite
Multi-factor Authentication: An Essenti...
Multi-factor authentication (MFA) is an essential component of cybersecurity that should be considered by enterprise businesses of all industries and sizes. With nearly 20% of organizations experiencing data breaches caused by stolen or compromised credentials, protecting organizational networks and resources with multi-factor authentication (MFA) is more important than ever. We will look at: What is Multi-factor Authentication? Why is there a...
December 13, 2022
Organizer: GlobalSign
Location: Webcast
Add Favorite
Level Up Your Cyber Defense
BlackBerry’s Research and Intelligence Team is on the cusp of something big: Be among the first to find out. Join host Steve Kovsky and threat researchers Ismael Valenzuela and Dmitry Bestuzhev for a live conversation as they reveal new ways for security teams to stay on top of cyber threat activity and anticipate threat actors’ next moves.
December 13, 2022
Organizer: Blackberry
Location: Webcast
Add Favorite
Cybersecurity Measurement Workshop
The NIST Cybersecurity Risk Analytics Team is hosting a workshop to provide an overview of the proposed changes for Special Publication 800 – 55, Revision 2, Performance Measurement Guide for Information Security. The purpose of the workshop is to provide clarity, answer questions, and gather stakeholder comments and opinions to ensure that Revision 2 will deliver comprehensive and relevant practices for measurement and metrics programs....
December 13, 2022
Organizer: NIST
Location: Webcast
Add Favorite
MARMS GIS
The Defense Threat Reduction Agency (DTRA) contracting activity is seeking qualified small business sources whose core capabilities include working with geospatial information systems to design and implement interactive maps. DTRA invites interested parties to attend an industry day on December 13, 2022 from 9AM – 1PM at the Defense Threat Reduction Agency at 8725 John J. Kingman Road, Fort Belvoir, VA 22060. Maximum of two participants...
December 13, 2022
Organizer: Department of Defense
Location: Fort Belvoir, VA
Add Favorite
Microsoft Security Virtual Training Day...
Join us at Security Virtual Training Day: Security, Compliance, and Identity Fundamentals from Microsoft Learn to explore the basics of security, compliance, and identity—including best practices to help protect people and data against cyberthreats for greater peace of mind. You’ll also learn more about identity and access management while exploring compliance management fundamentals. Who should attend: IT professionals Security en...
December 12-13, 2022
Organizer: Microsoft
Location: Virtual
Add Favorite
Back to Search Begin New Search