GrrCON Cyber Security Summit and Hacker...
GrrCON is an cyber security and hacking conference put together to provide the community with a venue to come together and share ideas, information, solutions, forge relationships, and most importantly engage with like minded people in a fun atmosphere without all the elitist “Diva” nonsense. We keep GrrCON small with around 2,000 attendance to allow us to provide those things other events leave out. Whether you are a Fortune 500 e...
EmpoWE-R Women of Information Security
Black Tie Affair – Formal EmpoWE‐R Women of Information Security formed to celebrate women in InfoSec and to create an inclusive environment for all to feel welcome. We come together empowering one another as women and everyone who has and continues to support US! All are Welcome! We have a discount code for Men to rent Tuxedo's, please ask and we are happy to provide. In 2021, we awarded $20,000 from our scholarship fund and will...
Identity Management for a Dynamic Workf...
User working patterns have completely turned upside down within the last six months. Recently, most organisations have adopted remote working, collaboration tools, cloud storage and applications into their critical business processes. Let’s address the elephant in the room: how can businesses securely facilitate access to these applications, data stores, devices and tools? In this webinar, a panel of security experts will discuss Zero Tr...
Building a Diverse, Skilled and Evolved...
In the fast-paced and data-driven modern landscape, a key element of a team’s success requires several layers of diversity – from thought to skill level, through to past experiences and future ambitions. Effective security teams are those built with diverse groups of highly-skilled specialists and broadly-adept generalists. While traditionally organisations have opted to create a list of required security specialities and then trie...
Key Technologies, Strategies and Tactic...
The global pandemic has seen phishers jump on the COVID-19 trend, and as a result the quantity of phishing messages related to the virus has spiked over the last few months. As well as phishing messages that try to download malware via lures of official documents, the standard practise of trying to a victim’s password and financial details remain. However as we have seen an increase in the types of phishing, to include more targeted effo...
Using a Managed Security Service Provid...
Despite the maturity of the managed security services provider (MSSP) market, security professionals and vendors often fail to sync up as true, successful partners. Whilst the role of the MSSP has been called into use in recent months as a result of managed services being required for a largely remote workforce, the MSSP is also needed when a company has weaknesses in its defense. In this webinar, we will consider how MSSP relationships work,...
InfoSecurity North America Expo and Con...
In November 2019, Infosecurity North America and ISACA will align in the field of security, cybersecurity and risk management to create an incredible experience for attendees in programming, solutions and networking. Join us for the next evolution of ISACA’s CSX North America Conference and Reed Exhibition’s Infosecurity North America event for an experience like no other. This combined conference brings together our expertise, key...
November 20-21, 2019
Organizer:
ISACA Location:
New York, NY
GRRCON 2019
GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people. We keep GrrCON small with around 1,700 attendance to allow us to provide those things other events leave out. Whether you are a Fortune 500 executive, security researcher, industry professional, student, or a hacker of “flexible” morals you will find somethin...
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
Creating a Culture of Security - Top 10...
Webcast: The Federal Information Security Management Act of 2002 (FISMA) mandates that each federal agency develop a program to provide information security for data and systems that support the agency's functions. And while agencies have had varying success meeting the demands of FISMA, the Obama Administration has ushered in a new wave of information security proponents eager to bolster these programs and create a new, higher level of cybers...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.