Workshop Wednesdays

Views Navigation

Event Views Navigation

Today

Situational Awareness Specialist Credentialing Training

GoToWebinar

This event occurs 12-2 EST over 2 days. Our world continues to evolve at a rapid pace. Along with the positives such as economic growth and technological advances, there is also a continued evolution by those who do harm. From violent extremists driven by ideology to criminal violence targeting individuals and our critical infrastructure, acts […]

$79

Cyber Threat Intelligence: Why it’s critical and how to build the capability within your organization

GoToWebinar

In this presentation we will demonstrate that any organization, regardless of size, can benefit from developing a threat intelligence function. We will discuss best practices from the field and outline the steps needed to take to become intelligence lead. Topics will include: What is Threat Intelligence? Why Intelligence Matters CTI Process Components Demystifying Threat Intelligence […]

$39

The Mass Attacks Defense Toolkit: Preventing Mass Attacks and Saving Lives

Funded by the National Institute of Justice, the Mass Attacks Defense Toolkit was created to help reduce the likelihood of mass shootings and other public attacks and reduce the casualties of completed attacks. Whatever your role or level of experience, this toolkit can make you a better defender against mass attacks. After studying 600 mass […]

$39

Certified Cyber Security Architect (CCSA) Certification Training (Part 1 & 2)

GoToWebinar

Distinguish yourself with the CCSA credential, the gold standard in cybersecurity. Learn about updates in the DoD CMMC 2.0 and alignment with NIST standards. Examine security incident management, essential cyber policies, encryption techniques and more. Explore best practices to establish a credible, evidence-based cyber defense program. The CCSA program provides knowledge to develop your skills […]

$79

Security Trends in the Convergence of Digital and Physical Identity and Access Management (IAM)

GoToWebinar

With the rapid adoption of cloud-based technology and the Internet of Things (IoT) the need to integrate both digital and physical identity and access management strategies is paramount for a streamlined 360 degree approach to security. Digital security strategies should be protected by physical security concepts, while the rise of cloud-based physical security applications and […]

Free

Building Foundations: Applying the Lessons of Recorded Future’s Threat Intelligence Handbook

GoToWebinar

Intelligence analysts will take the audience through the fundamentals of Security Intelligence as contained in Recorded Future's Threat Intelligence Handbook, to understand the application of dynamic, verifiable threat intelligence within security architecture to drive actionable business outcomes and accurately assess and forecast organizational risk. Presentation Agenda (Times and Speakers) Establish the foundations of Recorded Future's […]

$39.00

Applying Crime Prevention Through Environmental Design to Critical Infrastructure (CPTED)

GoToWebinar

Crime Prevention Through Environmental Design (CPTED) is a multi-disciplinary approach of crime prevention that uses urban and architectural design and the management of built and natural environments. CPTED strategies aim to reduce victimization, deter offender decisions that precede criminal acts, and build a sense of community among inhabitants so they can gain territorial control of […]

$39

Situational Awareness Specialist Credentialing Training (Basic)

GoToWebinar

This event occurs 12-2 EST over 2 days. Our world continues to evolve at a rapid pace. Along with the positives such as economic growth and technological advances, there is also a continued evolution by those who do harm. From violent extremists driven by ideology to criminal violence targeting individuals and our critical infrastructure, acts […]

$79

Hostile Surveillance Detection and Assessing Vulnerabilities

GoToWebinar

This workshop will discuss the importance of this under-utilized security countermeasure to protect critical infrastructures. Topics covered in this workshop include: Current Terrorist Trends Terrorist Planning Cycle Surveillance Indicators What hostile surveillants seek to be successful Red Zone Green Zone Concept Who Should be Trained in Surveillance Detection Strategies and Tactics for Assessing Threats Overview […]

$39.00

Soft Targets Protections: Safeguarding events and large crowds from vehicle attacks

GoToWebinar

Today's ever-evolving threat continuum presents challenges for safeguarding special events from Vehicle as a weapon attacks. The need for organizations to be proactively engaged in assessing risk from multiple angles cannot be understated. Soft target challenges on exterior perimeters to stadiums, venues, arenas, parades, carnivals, festivals, entertainment zones, and mass transit hubs are concerning on […]

$39

Soft Targets Protections: Safeguarding Events and Large Crowds from Vehicle Attacks

GoToWebinar

Today's ever-evolving threat continuum presents challenges for safeguarding special events from Vehicle as a weapon attacks. The need for organizations to be proactively engaged in assessing risk from multiple angles cannot be understated. Soft target challenges on exterior perimeters to stadiums, venues, arenas, parades, carnivals, festivals, entertainment zones, and mass transit hubs are concerning on […]

$39

Tired of Increasing Violence and Reading Headlines About “Leakage and Warning Signs Missed”?

GoToWebinar

Are you tired of seeing “leakage and warning signs missed” after shootings and violence in schools, workplaces, and communities? To stop more attackers before they attack, lessons learned from Columbine in 1999, 9-11 Attacks, and hundreds and hundreds of other incidents and tragedies must become lessons implemented. After most incidents we learn there was leakage […]

$39