Back to Search Begin New Search Save Search Auto-Notify
Key Technologies, Strategies and Tactic...
The global pandemic has seen phishers jump on the COVID-19 trend, and as a result the quantity of phishing messages related to the virus has spiked over the last few months. As well as phishing messages that try to download malware via lures of official documents, the standard practise of trying to a victim’s password and financial details remain. However as we have seen an increase in the types of phishing, to include more targeted effo...
August 6, 2020
Organizer: INFOSECURITY GROUP
Location: Webcast
Add Favorite
Using a Managed Security Service Provid...
Despite the maturity of the managed security services provider (MSSP) market, security professionals and vendors often fail to sync up as true, successful partners. Whilst the role of the MSSP has been called into use in recent months as a result of managed services being required for a largely remote workforce, the MSSP is also needed when a company has weaknesses in its defense. In this webinar, we will consider how MSSP relationships work,...
August 4, 2020
Organizer: INFOSECURITY GROUP
Location: Webcast
Add Favorite
InfoSecurity North America Expo and Con...
In November 2019, Infosecurity North America and ISACA will align in the field of security, cybersecurity and risk management to create an incredible experience for attendees in programming, solutions and networking. Join us for the next evolution of ISACA’s CSX North America Conference and Reed Exhibition’s Infosecurity North America event for an experience like no other. This combined conference brings together our expertise, key...
November 20-21, 2019
Organizer: ISACA
Location: New York, NY
Add Favorite
GRRCON 2019
GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people. We keep GrrCON small with around 1,700 attendance to allow us to provide those things other events leave out. Whether you are a Fortune 500 executive, security researcher, industry professional, student, or a hacker of “flexible” morals you will find somethin...
October 24-25, 2019
Organizer: MidWest InfoSec, LLC
Location: Grand Rapids, MI
Add Favorite
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
January 26, 2010
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
January 11, 2010
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Webcast: Creating a Culture of Security...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
December 17, 2009
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Malware, Crimeware and Phishing - In De...
Webcast: The evolution of malware and crimeware has produced more insidious and harmful intrusions to networks and systems. This webinar will show how these types of intrusions relate to phishing and will help put current attacks into perspective and help organizations anticipate likely trends. The webinar will also describe the different ways by which clients may be attacked, and their machines may become infected. While many of these threats...
December 14, 2009
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Embezzlement (Part 2): Conducting Finan...
Webcast: Conducting any kind of an investigation can be risky. Conducting an investigation that involves people's character, finances and relationships within a family or an employee's workplace is even riskier because it likely changes the lives, careers and relationships among all of the participants forever. Register for this session to learn: --Components of a financial crime investigation; --How to plan a financial crime investigative str...
December 14, 2009
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Anti-Money Laundering: A Guide to the L...
"Money-laundering is one of the most common and complex financial crimes to be committed. Learn exactly what you need to know about the specific statutes and regulations that govern the crime. The Currency and Foreign Transactions Reporting Act, also known as the Bank Secrecy Act (BSA), and its implementing regulation, 31 CFR 103, is the main regulatory tool the U.S. government uses to fight drug trafficking, money laundering and other crimes....
December 14, 2009
Organizer: GovInfoSecurity
Location: Webcast
Add Favorite
Back to Search Begin New Search