Workshop Wednesdays

Workshop Wednesdays

  1. Events
  2. Workshop Wednesdays

Views Navigation

Event Views Navigation

Today

Enhancing Financial Sector Security using Blockchain

This presentation will show the basic mathematics behind Blockchain. The second part will focus on cryptocurrency. The next section will look at a variety of applications of Blockchain. Finally, we will focus on how to enhance security in the financial sector using Blockchain. Learning Outcomes/Objectives Upon completion students will be able to:1. Understand Blockchain Basics.2. […]

Critical Infrastructure Protection: Why Should I Care?

GoToWebinar

Would you care if you could not use your cell phone or have access to the Internet? Would you care if you had no electricity or your car did not operate or if the trucks were all stopped and could not restock the grocery stores? In our world today these are real possibilities! We know […]

$39

Cyber Threat Intelligence: Why it’s critical and how to build the capability within your organization

GoToWebinar

In this presentation we will demonstrate that any organization, regardless of size, can benefit from developing a threat intelligence function. We will discuss best practices from the field and outline the steps needed to take to become intelligence lead. Topics will include: What is Threat Intelligence? Why Intelligence Matters CTI Process Components Demystifying Threat Intelligence […]

$39

The Mass Attacks Defense Toolkit: Preventing Mass Attacks and Saving Lives

Funded by the National Institute of Justice, the Mass Attacks Defense Toolkit was created to help reduce the likelihood of mass shootings and other public attacks and reduce the casualties of completed attacks. Whatever your role or level of experience, this toolkit can make you a better defender against mass attacks. After studying 600 mass […]

$39

Certified Cyber Security Architect (CCSA) Certification Training (Part 1 & 2)

GoToWebinar

Distinguish yourself with the CCSA credential, the gold standard in cybersecurity. Learn about updates in the DoD CMMC 2.0 and alignment with NIST standards. Examine security incident management, essential cyber policies, encryption techniques and more. Explore best practices to establish a credible, evidence-based cyber defense program. The CCSA program provides knowledge to develop your skills […]

$79

Security Trends in the Convergence of Digital and Physical Identity and Access Management (IAM)

GoToWebinar

With the rapid adoption of cloud-based technology and the Internet of Things (IoT) the need to integrate both digital and physical identity and access management strategies is paramount for a streamlined 360 degree approach to security. Digital security strategies should be protected by physical security concepts, while the rise of cloud-based physical security applications and […]

Free

Building Foundations: Applying the Lessons of Recorded Future’s Threat Intelligence Handbook

GoToWebinar

Intelligence analysts will take the audience through the fundamentals of Security Intelligence as contained in Recorded Future's Threat Intelligence Handbook, to understand the application of dynamic, verifiable threat intelligence within security architecture to drive actionable business outcomes and accurately assess and forecast organizational risk. Presentation Agenda (Times and Speakers) Establish the foundations of Recorded Future's […]

$39.00

Applying Crime Prevention Through Environmental Design to Critical Infrastructure (CPTED)

GoToWebinar

Crime Prevention Through Environmental Design (CPTED) is a multi-disciplinary approach of crime prevention that uses urban and architectural design and the management of built and natural environments. CPTED strategies aim to reduce victimization, deter offender decisions that precede criminal acts, and build a sense of community among inhabitants so they can gain territorial control of […]

$39

Hostile Surveillance Detection and Assessing Vulnerabilities

GoToWebinar

This workshop will discuss the importance of this under-utilized security countermeasure to protect critical infrastructures. Topics covered in this workshop include: Current Terrorist Trends Terrorist Planning Cycle Surveillance Indicators What hostile surveillants seek to be successful Red Zone Green Zone Concept Who Should be Trained in Surveillance Detection Strategies and Tactics for Assessing Threats Overview […]

$39.00

Soft Targets Protections: Safeguarding events and large crowds from vehicle attacks

GoToWebinar

Today's ever-evolving threat continuum presents challenges for safeguarding special events from Vehicle as a weapon attacks. The need for organizations to be proactively engaged in assessing risk from multiple angles cannot be understated. Soft target challenges on exterior perimeters to stadiums, venues, arenas, parades, carnivals, festivals, entertainment zones, and mass transit hubs are concerning on […]

$39

Soft Targets Protections: Safeguarding Events and Large Crowds from Vehicle Attacks

GoToWebinar

Today's ever-evolving threat continuum presents challenges for safeguarding special events from Vehicle as a weapon attacks. The need for organizations to be proactively engaged in assessing risk from multiple angles cannot be understated. Soft target challenges on exterior perimeters to stadiums, venues, arenas, parades, carnivals, festivals, entertainment zones, and mass transit hubs are concerning on […]

$39