Staying Ahead of Cyber Threats in 2024...
Digital transformation has supercharged both sides of the attack-defense divide. While it can feel as though the odds are stacked against cyber defenders, there are huge opportunities to improve our defenses in the new year with a Zero Trust cybersecurity model. Unlike the “trust but verify model,” zero trust uses “never trust, always verify.” Zero Trust assumes every request is a potential threat and requires full auth...
Hands On Workshop: Cyber42: Operational...
A 90-minute, interactive, gamified leadership exercise Enhance your proficiency in operational cybersecurity decision-making through immersive team-based simulations with Cyber42. Practice agile decision-making and information synthesis, key skills required for success in leadership roles. Engage in thought-provoking discussions and gain practical insights to improve your cybersecurity competencies. As cyber-attacks become more common and more...
Data Privacy, Cybersecurity, Generative...
This webinar features AWS, Microsoft and Morgan Lewis keynotes, offering technical, legal and compliance insights across the three critically important areas of Data Privacy, Generative AI and CyberSecurity. It is designed for IT/Technology leaders, General Counsel/Attorneys and their legal staff, plus Finance/Audit, Corporate Risk and Insurance professionals. Topics to be discussed are listed below. Click on green button to register, scroll d...
January 25, 2024
Organizer:
Angelbeat Location:
Webcast
The Rise of Cyber-Physical-Human System...
Digital technology, physical systems and human beings are more integrated than ever. This trend has led to the emergence of cyber-physical human systems (CPHS). This field focuses on the integration of cyber technologies, physical systems and human actions to accomplish a specific goal. Smart buildings, autonomous vehicles and telemedicine applications are all examples of CPHS within the rise of artificial intelligence – They aim to enha...
Hands-On Workshop | Least Privilege - A...
Many cloud-focused tools and third-party vendors require access to your organization’s cloud account. Sure, you could open up the flood gates and allow full, administrative access, but do those vendors and tools need that level of access? Most likely, no. In an age of increased supply chain and upstream vendor compromises, we must ensure that we are limiting any and all external access to what is truly needed and nothing more. In this wo...
Hands On Workshop: Cyber42: Transformat...
Practice your skills in an engaging, team-based environment to improve your cyber security executive decision making proficiency. Cyber42 is a realistic leadership simulation with applicable and discussion-based outcomes. Leave with a confidence boast in a key skill senior leaders seek from their CISOs: nimble decision making. With enterprises in need of protecting against an endless and increasing onslaught of information security threats, te...
Identify, Evaluate & Prioritize Industr...
Industrial control system (ICS) security represents one of the more challenging areas for security professionals. The typical ICS is complex and interconnected. It’s often a legacy system that wasn’t designed with security in mind and, because it’s different from traditional IT assets, it has very different security requirements. And no surprise—such systems are increasingly targeted by sophisticated cyberattackers, inc...
Strong Identity Starts with You Online Summit
A full-day virtual event focusing on innovation in biometrics across the hottest vertical markets: financial, travel and hospitality, government, healthcare, and the enterprise. A special fireside chat with our research partner Acuity Market Intelligence looks back on the year's highlights and controversies.
December 13, 2023
Organizer:
ChannelPro Location:
Webcast
Is Your SIEM Really Doing Its Job? How...
SIEMS are generally complex, slow, expensive, and underperform to expectations. In this webinar, Anomali’s Chief Adoption Officer Ali Haidar will explain the challenges the modern SOC faces and a creative way to immediately correlate threats to your internal environment without compromising speed or cost.Key takeaways: Learn how to search through petabytes of data going back up to 15 years in seconds Learn how to accelerate your analysts...
SANS Cyber Defense Initiative 2023: SAN...
ChatGPT, GPT-4, Llama 2, Bard, Minerva, Megatron, Claude, Chinchilla... What exactly are these "Large Language Models" that are in the news? What are they really good for? How do they work? What are the risks when we incorporate these into our business process? This 90 minute presentation and tutorial will explain how these models work, what transformers are, how embeddings work, and how to build a question answering AI... the easy way and the...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.