Workshop Wednesdays

 

Views Navigation

Event Views Navigation

Today

Westphalia 2.0: Critical Infrastructure Protection in the New Paradigm of DAOs, NFTs and the Metaverse

GoToWebinar

This workshop examines the looming impacts to critical infrastructure brought about by the emergence of Decentralized Autonomous Organizations (DAOs) where there is no central leadership and decisions get made from the bottom-up, Web3.0, an iteration of the World Wide Web-based on blockchain, and associated technologies. The workshop will concentrate on how a new generation of […]

$39

Critical Infrastructure Protection: Why Should I Care?

GoToWebinar

Would you care if you could not use your cell phone or have access to the Internet? Would you care if you had no electricity or your car did not operate or if the trucks were all stopped and could not restock the grocery stores? In our world today these are real possibilities! We know […]

$39

Nuclear and Radiological Incident Preparedness and Protection

This presentation will provide factual information on the effects and impacts of improvised nuclear detonations and radiological incidents, with a focus on measures to protect the public. This session will cover the differences in radiological incidents and nuclear detonations, including sheltering, evacuation considerations, and how to reduce radiation casualties. Through pre-designating safe shelter areas, providing […]

Importance of log collection, analysis and retention to better secure our environments

GoToWebinar

With the highly impactful cybersecurity events of the last year (Solarwinds, Log4j, and the Windows active directory bugs) there is renewed interest in security-related logging and analysis. In this webinar, we will discuss the Aug 2021 Office of Management and Budget’s Memo (OMB 21-31) “Improving the Federal Government’s Investigative and Remediation Capabilities Related to Cybersecurity […]

Situational Awareness Specialist Credentialing Training

GoToWebinar

This event occurs 12-2 EST over 2 days. Our world continues to evolve at a rapid pace. Along with the positives such as economic growth and technological advances, there is also a continued evolution by those who do harm. From violent extremists driven by ideology to criminal violence targeting individuals and our critical infrastructure, acts […]

$79

Cyber Threat Intelligence: Why it’s critical and how to build the capability within your organization

GoToWebinar

In this presentation we will demonstrate that any organization, regardless of size, can benefit from developing a threat intelligence function. We will discuss best practices from the field and outline the steps needed to take to become intelligence lead. Topics will include: What is Threat Intelligence? Why Intelligence Matters CTI Process Components Demystifying Threat Intelligence […]

$39

The Mass Attacks Defense Toolkit: Preventing Mass Attacks and Saving Lives

Funded by the National Institute of Justice, the Mass Attacks Defense Toolkit was created to help reduce the likelihood of mass shootings and other public attacks and reduce the casualties of completed attacks. Whatever your role or level of experience, this toolkit can make you a better defender against mass attacks. After studying 600 mass […]

$39

Certified Cyber Security Architect (CCSA) Certification Training (Part 1 & 2)

GoToWebinar

Distinguish yourself with the CCSA credential, the gold standard in cybersecurity. Learn about updates in the DoD CMMC 2.0 and alignment with NIST standards. Examine security incident management, essential cyber policies, encryption techniques and more. Explore best practices to establish a credible, evidence-based cyber defense program. The CCSA program provides knowledge to develop your skills […]

$79

Security Trends in the Convergence of Digital and Physical Identity and Access Management (IAM)

GoToWebinar

With the rapid adoption of cloud-based technology and the Internet of Things (IoT) the need to integrate both digital and physical identity and access management strategies is paramount for a streamlined 360 degree approach to security. Digital security strategies should be protected by physical security concepts, while the rise of cloud-based physical security applications and […]

Free

Building Foundations: Applying the Lessons of Recorded Future’s Threat Intelligence Handbook

GoToWebinar

Intelligence analysts will take the audience through the fundamentals of Security Intelligence as contained in Recorded Future's Threat Intelligence Handbook, to understand the application of dynamic, verifiable threat intelligence within security architecture to drive actionable business outcomes and accurately assess and forecast organizational risk. Presentation Agenda (Times and Speakers) Establish the foundations of Recorded Future's […]

$39.00

Applying Crime Prevention Through Environmental Design to Critical Infrastructure (CPTED)

GoToWebinar

Crime Prevention Through Environmental Design (CPTED) is a multi-disciplinary approach of crime prevention that uses urban and architectural design and the management of built and natural environments. CPTED strategies aim to reduce victimization, deter offender decisions that precede criminal acts, and build a sense of community among inhabitants so they can gain territorial control of […]

$39