Cybersecurity Awareness Month - Working Virtual: Is Your Organization CyberSAFE?
Many companies have moved virtual overnight without the opportunity to safely prepare end-users for remote work. IT and Security teams have reconfigured systems and related policies to better protect your infrastructure and data, but many still struggle with less oversight over end-user environments. With phishing attacks on the rise and malware a threat to businesses of all sizes, what is the basic awareness your employees need at this time? Join us to learn why it is important for end-users to identify the need for security, secure their devices, and learn to navigate the world of virtual connectivity. You will also explore how organizations can implement cyber awareness compliance programs can help reduce incidents by up to 70%.
RegisterThursday, October 1, 2020 | 12:00PM Eastern
Cybersecurity Awareness Month - Securely Empower a Remote Workforce with Citrix Technologies
With the adoption of work-from-home and other remote workforce realities, the need for secure information technologies has never been greater. For years, Citrix has been building technologies around the idea of a Secure Digital Workspace, allowing any user on any device to connect from any place at any time. Join us for a look at how Citrix gives an organization the highest confidence in securing daily business transactions regardless of where in the world its workforce is positioned.
RegisterTuesday, October 6, 2020 | 12:00PM Eastern
Cybersecurity Awareness Month - The Right Skills for Cybersecurity
Do you question whether your Cybersecurity and IT Professionals have the right skills to protect your data? Are you having difficulty validating who would be a good candidate to join your Cybersecurity team? In this session we will explore what job roles are most necessary to securing your infrastructure and how to acquire the skills to perform the most critical tasks.
RegisterThursday, October 8, 2020 | 12:00PM Eastern
7 Brainstorming Techniques that Drive Design Thinking Success
The third step of the Design Thinking process is “Ideate”, which is a fancy way of saying brainstorming to identify potential innovations/solutions.
This webinar reviews the Design Thinking process and provides various brainstorming techniques that can be used during the Ideate step and in virtually all other brainstorming-related situations.
RegisterFriday, October 9, 2020 | 12:00PM Eastern
Cybersecurity Awareness Month - Getting An ISO Information Security Certification
These days there is an increasing demand for ISO 27001 Information Security Management System (ISMS) certification, both for companies and professionals. In the case of companies, the business drivers are reduction in insurance premiums, the ability to demonstrate due care and due diligence in court, the ability to instill confidence in the marketplace, to address third-party and supply chain risk management. Increasingly companies require their supply chain partners to be certified if they want to continue doing business with large prime contractors. This is creating a concurrent demand in the marketplace for professionals that are certified to implement, audit and manage an ISMS. This presentation will cover the changing market terrain and explain strategies on how to move forward with an ISO certification.
RegisterTuesday, October 13, 2020 | 12:00PM Eastern
Cybersecurity Awareness Month - Real World Cyberwar Lessons Learned
Estonia is a small country in the Baltics however it has been on the forefront of technology for many years. Joseph Carson provides a story from Estonia's independence in 1991 to its use of blockchain for the integrity of voting and medical records. The importance and the critical role of an identity management system allows a citizen to vote, check online banking, e-residents and tax returns safely impacts cyber war and the lessons learned on the risks.
• Importance of Blockchain for Data Integrity and Veracity
• The need for Government Identity Management
• Cyber War Lessons Learned
RegisterWednesday, October 14, 2020 | 12:00PM Eastern
Cybersecurity Awareness Month - The Hidden Vulnerability Exposed
The stakes for software security are extremely high with over 100 billion lines of software code being produced each year and 70% of code in apps composed of open-source software and third-party libraries, and yet many developers are forced to address software security when a vulnerability has been exposed. In this webinar we will discuss the impact of application security, what is needed to better identify coding vulnerabilities – including those in the OWASP Top Ten, and learn why incorporating security into all phases of the lifecycle is a must-have for any development team. We will also explain why certification is becoming part of the new normal for development professionals.
RegisterThursday, October 15, 2020 | 12:00PM Eastern
Cybersecurity Awareness Month - Which INFOSEC Certification Pathway is Right for You?
Which INFOSEC certification is right for you? Are you just starting out in the Security field, or do you want to validate your experience, Security skills, and knowledge? Presenters Ben Malisow and Robin Cabe, hosts of the podcast: “The Sensuous Sounds Of INFOSEC,” (www.securityzed.com) will be discussing popular Security certifications; ISACA, (ISC)2, COMPTIA, and Cloud-based Certifications offering certification roadmap advice for all practitioners, regardless of skill level or experience. If you’re interested in Security Certification training but don’t know which course to choose, or uncertain which course will help you leverage your next promotion, join the INFOSEC team of presenters and choose your next career pathway.
RegisterFriday, October 16, 2020 | 12:00PM Eastern
Cybersecurity Awareness Month - Setting Up a Privacy Management Program
With the advent of the European Union’s General Data Protection Regulation (GDPR), and worldwide similar initiatives organizations have an ever-increasing demand for privacy talent, who can establish and administrate a privacy program. This webinar will explore the market drivers, as well as the current approaches to include privacy frameworks (NIST Privacy Framework, ISO 29100 Privacy Framework, etc.), the evolving roles in the world of privacy (Data Protection Officers, Chief Privacy Officers, Privacy Engineers, and technologist), and where the world of privacy management is headed. If you are looking for a new career field, or trying to pick a career area with huge momentum and upside this may be the career move for you.
RegisterTuesday, October 20, 2020 | 12:00PM Eastern
Cybersecurity Awareness Month - Rust Never Sleeps: Managing Today's Cybersecurity Attack Surface
Dr. Stanger will discuss how successful cybersecurity management has parallels with managing a rusty car in the rainy Pacific Northwest. If rust never sleeps, then neither can a cybersecurity professional when it comes to managing today’s attack surface. James will discuss how, with the genesis of governance, risk management, and compliance, there are now three major perspectives concerning managing cybersecurity. Finally, James will discuss the importance of increasing visibility, as well as the increasing role of cybersecurity threat intelligence and threat profiling.
RegisterWednesday, October 21, 2020 | 12:00PM Eastern