Creating an Extra Network Layer of Prot...
Thanks for stopping by! Together, with AWS, Trend has crafted 5 unique Security Immersion Days to address your organization's cloud security challenges. Please view agendas and learning objectives below and select one or more workshops to join! See you soon. Cloud workloads frequently require internet access, and as we know, anything accessing the internet can be breached. This workshop explores simple tactics on how to protect the internet co...
Why Get AWS Certified? Presented by AWS...
In this webinar, you’ll learn about the advantages of getting AWS Certified. You’ll also learn about the various certifications offered by AWS and what is available to help you pass these certifications. In this course, you will learn to: Identify the value of AWS certifications Identify the categories of AWS certifications Identify the methods for taking a certification Identify the training available to help you pass the exam Who...
Securing your Data Migration to AWS S3
Thanks for stopping by! Together, with AWS, Trend has crafted 5 unique Security Immersion Days to address your organization's cloud security challenges. Please view agendas and learning objectives below and select one or more workshops to join! See you soon. In this session, we will look at a design pattern that can be used to simplify your data ingest and migration journey into AWS. Participants will get hands-on experience in deploying, conf...
Securing AWS Infrastructure with Trend Micro
Thanks for stopping by! Together, with AWS, Trend has crafted 5 unique Security Immersion Days to address your organization's cloud security challenges. Please view agendas and learning objectives below and select one or more workshops to join! See you soon. Learn how to leverage infrastructure as code (IaC) and Security to automate your cloud security efforts. If you’re interested in making cloud security more efficient, automated, proa...
A Zero Trust Approach to Securing your...
Join us to learn how to secure smart medical devices in your ecosystem using a Zero Trust approach! We have a great agenda lined up including a fireside chat with Ryan Kramer, Enterprise Infrastructure Architect for the State of North Dakota, who will be sharing his expertise and best practices in securing IoT devices. In this webinar we’ll discuss: The unseen and exponential risk to healthcare networks resulting from the massive prolife...
Virtual DevLab
Join our free virtual lab and see how easy it is to secure your organization’s website, custom applications and API services with Okta’s Customer Identity Cloud (powered by Auth0). Our team of experts will guide you through the following activities: Adding OIDC Authentication to a Single Page App (SPA) Registering an API & Securing Endpoints Enriching Tokens with Custom Logic in Login Flows Branding the Login Experience Who sho...
April 5, 2023
Organizer:
Okta Location:
Webcast
The Fundamentals of Application Securit...
As the nine time Gartner Magic Quadrant Leader, the Veracode team will touch on the best practices that have assisted many of their existing customers during this four-part webinar series. Upon completion of all four parts, you will be awarded a VeraTrack Education Certificate. In order to receive the certificate, you may either attend the live sessions, or view the on-demand recordings. View the full agenda and register for all four sessions...
Think Like a Hacker: Tactics to Identif...
Earn 1.5 CPE Credits on this webinar. Cybersecurity is one of the largest concerns facing businesses today and hackers continuously develop diverse ways of penetrating your cybersecurity defences. By adopting the mindset of a hacker, you can be one step ahead of malicious attacks and improve your cybersecurity infrastructure. On this CPE webinar our panel of experts will address how and why security gaps arise in IT security posture, and provi...
Uncovering Hidden Risks in Your Cloud E...
Whether you’re a first time CISO, or this is your tenth CISO gig, any cybersecurity pro can benefit from creating– or updating– an actionable plan to tackle cloud security risks. But where to begin? Our veteran panel of security professionals, including Andy Ellis, Advisory CISO, Orca Security; as well as Kathryn Kun, Office of the CSO, Akamai Technologies; and George Werbacher, Director of Information Security, Blackbaud, wi...
Fighting Fraud in Higher Education with...
Today's higher education institutions are facing greater financial risk due to an increase in both internal and external fraud. While some institutions are using traditional security tools to detect certain types of fraud, the vast increase in the types of fraud requires a different approach to build out a comprehensive approach to detect a greater number of threats. Splunk takes a different approach in that we not only focus on the detection...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.