Threat Hunting Submit

SecurityWeek’s Threat Hunting Summit will present innovative strategies and tools that security teams use to detect, contain, and eliminate attackers present in or attempting to infilt...

Cyber Risks Management in the New Digitalisation Age

Date: 11-12-2020 Time: 2PM-3.30PM Fee: FREE
Venue: Virtual
Link: https://us02web.zoom.us/webinar/register/5816056170374/WN_2pxJY5mvQWqDivjZACN7OQ
Cyber Risks Management in the New Digitalisation Age

Cyber Risks Management in the New Digitalisation Age Cybersecurity Management and Risks Transfer Considering the complex, dynamic network and devices that businesses must govern across firewalls, ap...

HACKER-POWERED SECURITY CONFERENCE, SECURITY

HackerOne’s global Security@ conference is back for its fourth year. The annual conference gathers the largest community of security industry influencers, public and private sector thought leade...

Attack and Defence in AWS: Chaining vulnerabilities to go beyond the OWASP Top 10

Date: 13-08-2020 Time: 10.00 AM to 2.00 PM IST Fee: $530
Venue: Website
Link: https://nullcon.net/website/online-training-2020/training/attack-and-defence-aws.php
Attack and Defence in AWS: Chaining vulnerabilities to go beyond the OWASP Top 10

Event Duration: 4 Days Attacking the most popular cloud provider - AWS, requires the knowledge of how different services are setup, what defences do we need to bypass, what service attributes can be ...

Continuous Controls Monitoring: What to Measure

Date: 11-08-2020 Time: 10-11 a.m. EST (2-3 p.m. UTC) Fee: Website
Venue: Website
Link: https://www.fsisac.com/events/ews72
Continuous Controls Monitoring: What to Measure

This session outlines how to establish a CCM program and examples of those security metrics which will deliver speed to value in reducing risk.In this webinar you will learn: What is Continuous Con...