ICIT 2021 Fall Briefing -- Crossing the...
ICIT 2021 Fall Briefing The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancin...
ICIT 2021 Fall Briefing--Crossing the D...
The 2021 ICIT Fall Briefing Series will be hosted on-line as a series of three weekly virtual events focused on cyber convergence or integrating physical and cyber security strategies. CISA suggests that business leaders develop a “…holistic security strategy that aligns cybersecurity and physical security functions…”. By bringing together top public and private sector leaders, ICIT is advancing the conversation about...
CSI - Discovering the DDoS Criminal's M...
Briefing Summary:When it comes to DDoS crimes, there’s no such thing as questions, just hidden answers. This virtual briefing will provide a crime scene investigation of today’s DDoS criminals. Answering questions such as how are attacks launched and why aren’t they getting detected and stopped in time? The panelists will continue the investigation by turning the lens to the victims, why do companies with best-in-class mitig...
Optimizing SOC Operations - ICIT Virtua...
Briefing Summary: Security operations centers (SOC) are the backbone of the cybersecurity industry providing defense, mitigation, and incident response against risks and attacks. However, SOCs are often criticized as ineffective, and one of the most frequently asked questions about SOC performance is “how to measure SOC effectiveness?” While mean time to resolution (MTTR) is the standard measure of effectiveness, this high-level me...
ICIT September 2021 - Cyber Legislation...
ICIT’s monthly "Cyber Legislation & Federal Initiatives Webcast" provides an efficient yet powerful summary of ICIT's monthly analyst reports covering new cybersecurity, technology, and privacy related legislation and federal agency initiatives. Pre-Briefing, all ICIT Members are sent 2 separate ICIT Analyst Reports detailing the content discussed during this webinar. For more details on ICIT Individual and Corporate Membership, plea...
Secure Automation for Mission Readiness...
Briefing Summary: Federal agencies have increased focus on Intelligent Automation (IA) and Robotic Processing Automation (RPA) as part of their modernization journey. Many have achieved impactful results from automating countless manual processes, freeing up time to focus on innovation and mission support. Although mission critical, the acceleration of automation can introduce new security risks and expand the attack landscape. Agencies lookin...
ICIT July 2021 - Cyber Legislation ...
ICIT’s monthly "Cyber Legislation & Federal Initiatives Webcast" provides an efficient yet powerful summary of ICIT's monthly analyst reports covering new cybersecurity, technology, and privacy related legislation and federal agency initiatives. Pre-Briefing, all ICIT Members are sent 2 separate ICIT Analyst Reports detailing the content discussed during this webinar. For more details on ICIT Individual and Corporate Membership, plea...
ICIT June 2021 - Cyber Legislation ...
ICIT’s monthly "Cyber Legislation & Federal Initiatives Webcast" provides an efficient yet powerful summary of ICIT's monthly analyst reports covering new cybersecurity, technology, and privacy related legislation and federal agency initiatives. Pre-Briefing, all ICIT Members are sent 2 separate ICIT Analyst Reports detailing the content discussed during this webinar. For more details on ICIT Individual and Corporate Membership, plea...
The Newest Attack Vectors - Infrastruct...
The Newest Attack Vectors - Infrastructure as Code & API Security Moving applications and development to the cloud has delivered both operational and security benefits at scale. However, as organizations begin to automate their infrastructure deployments and configurations using Infrastructure as Code (IaC), a new attack vector has been introduced. In addition, the move to cloud-native architectures increases the use of APIs connecting cli...
Zero Trust: Who’s In Your Network?
Zero Trust: Who’s in your network? In 2019, securely operating a distributed workforce was an ideal “wouldn’t it be great if,” and in 2020, this became a requirement. In the wake of the COVID-19 pandemic, cybersecurity teams found themselves frantically working to continue business operations in a suddenly perimeter-less environment. And that trend is likely here to stay, which means that cybersecurity and business lea...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.