SecureWorld West Coast Virtual Conference
For more than 21 years, SecureWorld conferences have been connecting, informing, and developing leaders in cybersecurity through in-person regional events and interactive online platforms. Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-18 CPE credits through 20-40 educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel...
December 8, 2022
Organizer:
SecureWorld Location:
Virtual
Texas K-12 Cybersecurity - Threat Lands...
Register today for our upcoming Proofpoint webinar! During the session, you'll hear from Todd Pauley, Deputy Chief Information Security Officer (CISO) of the Texas Education Agency. He'll provide updates on efforts by the TEA to support cybersecurity for Texas public schools. You'll also hear from keynote speaker Sara Sabotka, Senior Threat Researcher who works on Proofpoint's Threat Research Team. She'll give an overview of the current cyber...
Deploying Server Management Best Practices
This intermediate Tableau Success Connector session is primarily designed for Tableau Server Admins. This session provides an overview of: How to plan your Server Management deployment strategy How to deploy your Server Management strategy How to maintain and monitor environments and incidents How to migrate content This intermediate session is for Tableau Server Admins. This is NOT formal training of a certification session.
December 8, 2022
Organizer:
Tableau Location:
Webcast
Deploying Data Management Best Practices
Description and Agenda: This intermediate Tableau Success Connector session is primarily designed for Tableau Server Admins. This session provides an overview of: Data Management components Tableau Blueprint and the modern analytics workflow Tableau Prep Conductor Tableau Catalog This intermediate session is for customers with basic experience implementing Tableau. This is NOT formal training of a certification session.
December 8, 2022
Organizer:
Tableau Location:
Webcast
2022 Social Engineering Report: How Thr...
Through 2022, cyber criminals have continued successfully exploiting the human element to recognize financial gain, leaning heavily on social engineering tactics. This is unlikely to change any time soon. The most sophisticated criminal organizations have evolved to mirror legitimate businesses and as a result have scaled to become more resilient while also recognizing greater profits than ever before. Join Daniel Blackford and Selena Larson f...
December 8, 2022
Organizer:
Proofpoint Location:
Webcast
Top Cybersecurity Predictions for 2023
2022 has seen a world in turmoil: geo-political situations enhancing nation-state threats, brand names being targeted with Ransomware for Bitcoin payout, hackers bringing down companies through exploiting known vulnerabilities, and CISOs left wondering what is coming next to disrupt their sleep. Rapid7 researchers & analysts have their finger on the pulse of what is going on, and our Chief Scientist, Raj Samani, will lead a lively debate a...
December 8, 2022
Organizer:
Rapid7 Location:
Webcast
Reach it, Don't Breach It!
It is no secret your data in the cloud is vulnerable. What's worse is that, according to Gartner, more than 99% of cloud breaches will have a root cause of preventable misconfiguration or mistakes by end users through 2025. But the silver lining -- more like silver word -- to your cloud is that these breaches can be preventable so you can reach to your data in cloud when you need it. Tune in to this presentation from TD Bank's Leena Bongale if...
December 8, 2022
Organizer:
BrightTALK Location:
Webcast
Breach Detection in the Cloud
When we think of cybersecurity for enterprises, we think next-gen firewalls, EDR, and SIEM. But none of these resources can protect your cloud assets as traditionally employed. This means companies must use new techniques to protect cloud environments and the various SaaS applications deployed by modern enterprises. Tune into this talk to learn: How to collect telemetry and generate alerts from various cloud environments. Techniques to detect...
December 8, 2022
Organizer:
BrightTALK Location:
Webcast
Top 5 Strategies to Reduce the Risk of...
This session will describe approaches and suggestions for potentially lowering your risk of a breach and how to prepare for when they happen. We will discuss our experiences and practical ideas for consideration to take back to your companies. Tune in to learn more about these topics: What is the definition of a breach SANS Security Critical Controls – CIS Control Inventory and Control of Enterprise Assets CIS Control Inventory and Contr...
December 8, 2022
Organizer:
BrightTALK Location:
Webcast
CompTIA AWIT: GET real with CompTIA Wom...
On Thursday, December 8, 2022, we will be hosting a watch party. The event kicks off at 10:00 am CT. CompTIA Women of the Board will be sharing insights into how they started in tech, how they find their balance with work, family, and board responsibilities, their imposter syndrome moments, and more. We will have approximately 30 minutes of presentations from our board members before we open the floor to Q&A. This is your chance to ask que...
December 8, 2022
Organizer:
CompTIA Location:
Webcast
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.