Creating & Sharing Value with Network Activity and Threat Correlation

Creating & Sharing Value with Network Activity and Threat Correlation

We examine the key impediments to effective information sharing and explore how network activity ...
SANS Women’s CONNECT student camp activity

SANS Women’s CONNECT student camp activity

Special Event for Girls & Women in Tech presented in partnership with ISSA Women in Security SIG, ...
FIRST Las Vegas Technical Colloquium

FIRST Las Vegas Technical Colloquium

Forum of Incident Response and Security Teams (FIRST) is proud to announce the FIRST Las Vegas ...

Sector Canada, “Security Training in a (Virtual) Box”

Illuminating the Black Art of Security. Now entering its 11th year, SecTor has built a reputation ...
SkyDogCon

SkyDogCon

SkyDogCon is excited to announce a workshop presented by Marcelle Lee.  This two hour workshop ...
Cyber3 Conference Tokyo 2017

Cyber3 Conference Tokyo 2017

The three elements of Cyber3 are cyber connections, cybercrime and cybersecurity. Specifically, ...
Anatomy of a Phish: Why Spam Works

Anatomy of a Phish: Why and How Spam Works

Embrace cutting-edge insights in the city at the nerve center of U.S. government and ground zero ...
Real-Time Threat Killers – Threat Intelligence Gateways and Platforms

Real-Time Threat Killers – Threat Intelligence Gateways and Platforms

Threat intelligence has evolved dramatically over the past three years with the volume and speed of ...

2017 Actionable Threat Intelligence Survey

We recently partnered with ISMG to develop and administer a survey delving into the current state ...

Assessing Critical Infrastructure and Third Party Attack Surfaces

Critical Infrastructure and Commercial Third Parties are important to both national and enterprise ...