AWS re:Invent

We invite you to join us for keynotes, launches, sessions, and more—presented across 3 weeks from Nov. 30 – Dec. 18.

Protecting Customer Data

Virtual Conference

As a small business owner, it's your job to protect not only your business' data, but also your customers' data from breaches and theft. In this webinar, Malcolm Web, Team […]

SolarWinds Hack: Fallout, Recovery, and Prevention

Virtual Conference

Summary The recent SolarWinds incident demonstrated the challenges of securing systems when they are the product of complex supply chains. Agenda The recent SolarWinds incident demonstrated the challenges of securing […]

Security Fundamentals for Windows Virtual Desktop Environments

Virtual Conference

Watch this free webinar to learn about built-in security capabilities of Windows Virtual Desktop. You’ll also find out how to improve your security posture by integrating your desktop environment with […]

2021 Cyber Threats, Trends & Mitigation

Virtual Conference

The cybersecurity threat landscape is constantly changing and growing. How can companies identify what’s important and find points of improvement in their cyber programs? In this webinar, Dustin Brewer, Sr. […]

Enabling Cybersecurity Accountability for the Enterprise

Virtual Conference

Establishing a security-forward culture is your first line of defense against cyber-threats. Layered security strategies are only as strong as their weakest layer. Fostering a risk-aware workforce enables CISOs teams […]

Cybersecurity Fundamentals for SMEs

Virtual Conference

Join this webinar, in partnership with ITC and ecomConnect, delivered by the Cyber Readiness Institute, to dive into cybersecurity fundamentals. We will cover four core areas that have the greatest impact on your […]

Cover Your Assets: Securing Critical and High-Value Assets

Virtual Conference

CISA invites you to join the awareness webinar, "Cover Your Assets: Securing Critical and High-Value Assets (July)" on Thursday, July 22, 2021. We are excited to share this information with […]

Would you like for your event to be displayed on the events calendar?  Submit cybersecurity related events using our event submission form.