AFCEA NOVA Army IT Day
Registration is Closed With over 6,000 individual and corporate members, our chapter boasts the largest membership in the AFCEA International community. Our chapter is blessed with the hometown advantage of having the Pentagon in our back yard, the Nation's Capital right next door, and the backbone of the Internet at our center. This means that our Monthly luncheons, IT Days, Breakfast and special events connect you with Government speakers th...
January 12, 2023
Organizer:
AFCEA NOVA Location:
McLean, VA
Eastern-January CyberSecurity Conference
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizatio...
January 12, 2023
Organizer:
FutureCon Location:
Virtual
A Leader's Guide to Security Operations...
In “The 2021 State of Enterprise Breaches,” Forrester found that enterprises spend a median of 37 days and a mean of $2.4 million to find and recover from a breach. Ensure your team is prepared for advanced threat actors. Forrester recommends that security leaders must advocate for investment in efforts like digital transformation to help the organization be more adaptable and focus on data and metrics to uncover prevalent attack v...
Blind Data Exfiltration Using DNS and B...
DNS provides one of the best methods for command and control, covert tunneling, and blind data exfiltration. Burp Collaborator provides a great way to both confirm blind injection, and also exfiltrate data. Penetration testers may prepend names to each DNS request, allowing data exfiltration subject to DNS's length limitations (63 characters per label, 255 characters total name) and character limitations. This webcast will describe methods for...
Prepare Your IT for 2023: How to Improv...
Cloud-based solutions can help government agencies accelerate digital transformation. By migrating workloads to the cloud, agencies can improve their processes from end-to-end while offering solutions that enhance data security, mitigate risk and provide next-generation speed and flexibility. The common thread in all these improvements is artificial intelligence (AI) and machine learning (ML) which allows non-technical staff to use prebuilt t...
FloCon 2023
FloCon focuses on applying any and all collected data to defend enterprise networks. While past conferences emphasized network flow data, FloCon now centers on improving network security by analyzing a variety of data supported by innovative machine learning, hardware, and network storage. These analyses draw upon this diverse data to track security-critical characteristics and threats, including network size, structure, and traffic -- plus a...
XDR Does Not Exist Without NDR
In today’s world of enterprise security, many technology options are available—perhaps too many. Despite all the options available, security teams still ask the same questions: What is the “right” telemetry? How do we best integrate, and where can we find the best return on our investment? In response to these questions, and the need to disrupt adversary TTPs, eXtended Detection and Response (XDR) technologies have emer...
Guide to 100% Secure Cloud-Native Apps
This engaging session takes a light-hearted look at securing your cloud-native applications and gives a detailed list of what (not) to do. We’ll cover how to ensure your developers never create insecure or vulnerable code, we’ll talk about how to enable complete zero trust, and most importantly we’ll talk about how to guarantee 100% security of your cloud-native applications.
Not in My Cloud: Detect Malicious Activ...
Bad actors don’t knock on the front door. They find a way into your infrastructure whether through your supply chain, a misconfiguration, impersonating a user with stolen credentials, a zero-day exploit or other advanced techniques that we may not have seen yet. It is important to make sure that preventative measures are in place and following best practices, but you also need to be ready to detect attacks and take actions. Join SANS ana...
Personal Security with Agency
Enterprise security is a multi-billion-dollar industry, with multiple products and services available to help customers protect their networks. However, do the same types of protections, services, and security exist for personal users and/or employees within enterprises? After all – individuals are most at risk from attacks like account takeover and ID theft, which can also compromise enterprise networks. Unfortunately, most security mon...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.