RSA-USA-TradeShow-Header

RSA USA 2018

thotcon-2018

Thotcon 2018

THOTCON 0x9 - a hacking conference based in Chicago IL, USA. This is a non-profit, non-commercial ...
event-infosec-europe-2018

InfoSec Europe 2018

Infosecurity Europe (Infosec) is the region's number one information security event featuring ...
event-blackhat-2018-banner

Black Hat USA 2018

Black Hat is the most technical and relevant global information security event series in the world. ...
Gartner - Dubai - 2018

Gartner Dubai 2018

As a CIO and senior IT leader, you need actionable advice to drive digital to the core of your ...
NexGen Conference & Expo

NexGen Conference & Expo

The NexGen 2017 Technology Expo is designed for solution providers on the cutting edge of the ...
RSA Abu Dhabi

RSA Abu Dhabi

RSA Conference 2017 Abu Dhabi is the leading information security event in the region. This year's ...
LookingGlass Cybersecurity Symposium

LookingGlass Cybersecurity Symposium

Welcome to the LookingGlass Cybersecurity Symposium! We’re pleased for you to join LookingGlass ...
event-fs-isac-fall-2017

Fall FS-ISAC

As Partners in the Information Security community we have all been challenged in 2017 with the ...
Real-Time Threat Killers – Threat Intelligence Gateways and Platforms

Real-Time Threat Killers – Threat Intelligence Gateways and Platforms

Threat intelligence has evolved dramatically over the past three years with the volume and speed of ...
Through the LookingGlass – What We Learned from Major Cybersecurity Events in 2017

Through the LookingGlass – What We Learned From Major Cybersecurity Events in 2017

From WannaCry to BadRabbit, 2017 was filled with cybersecurity meltdowns. The cybersecurity ...
Threat Intelligence-As-A-Service: Fortify Your Security Posture

Threat Intelligence-As-A-Service: Fortify Your Security Posture

Security organizations face numerous challenges, from increasingly large volumes of data and lack ...
Are Your Third Party Vendors Exposing Your Organization to Cyber Threats?

Are Your Third Party Vendors Exposing Your Organization to Cyber Threats?

By now, the majority of us have likely been inundated with stories about third party data breaches ...
Are Your Third Parties a Ticking Time Bomb?

Are Your Third Parties a Ticking Time Bomb?

Are Your Third Parties a Ticking Time Bomb? Outsourcing and strategic partnerships are a staple in ...
Don’t Believe the Hype: The Dark Web is just another source for intelligence

Don’t Believe the Hype: The Dark Web is just another source for intelligence

Wednesday, August 30th, 2017 | 2pm ET Speakers: Eric Olson, VP of Intelligence Operations, James ...
Success Factors in Threat Intelligence: Part 4

Success Factors in Threat Intelligence: Part 4 – Connecting the Dots

In this final part of the CSO Series, we will describe how successful TI Programs can fully deliver ...
Success Factors in Threat Intelligence: Part 3

Success Factors in Threat Intelligence: Part 3 – Key Elements

With Part 2, we introduced the overall vision of a successful TI Program. In this webinar, we dig ...
Success Factors in Threat Intelligence: Part 2

Success Factors in Threat Intelligence: Part 2 – Starting a Program

In Part 1 of the CSO Series, LookingGlass Chief Technology Officer, Allan Thomson, introduced the ...
Success Factors in Threat Intelligence

Success Factors in Threat Intelligence: Part 1 – Business Requirements

Part 1: Success Factors in Threat Intelligence: Business Requirements - (30 mins; 10-15 slides)
webinar-bigger-isnt-better

Cyber Attack Surface

Ransomware, spear phishing and third party breaches have become a huge problem as organizations ...

ACC Foundation Cybersecurity Summit

ABOUT THE SUMMIT On behalf of the ACC Foundation, we invite you to participate in our one-day ...
Creating & Sharing Value with Network Activity and Threat Correlation

Creating & Sharing Value with Network Activity and Threat Correlation

We examine the key impediments to effective information sharing and explore how network activity ...
SANS Women’s CONNECT student camp activity

SANS Women’s CONNECT student camp activity

Special Event for Girls & Women in Tech presented in partnership with ISSA Women in Security SIG, ...
FIRST Las Vegas Technical Colloquium

FIRST Las Vegas Technical Colloquium

Forum of Incident Response and Security Teams (FIRST) is proud to announce the FIRST Las Vegas ...

Sector Canada, “Security Training in a (Virtual) Box”

Illuminating the Black Art of Security. Now entering its 11th year, SecTor has built a reputation ...
SkyDogCon

SkyDogCon

SkyDogCon is excited to announce a workshop presented by Marcelle Lee.  This two hour workshop ...
Cyber3 Conference Tokyo 2017

Cyber3 Conference Tokyo 2017

The three elements of Cyber3 are cyber connections, cybercrime and cybersecurity. Specifically, ...
Anatomy of a Phish: Why Spam Works

Anatomy of a Phish: Why and How Spam Works

Embrace cutting-edge insights in the city at the nerve center of U.S. government and ground zero ...
Real-Time Threat Killers – Threat Intelligence Gateways and Platforms

Real-Time Threat Killers – Threat Intelligence Gateways and Platforms

Threat intelligence has evolved dramatically over the past three years with the volume and speed of ...

2017 Actionable Threat Intelligence Survey

We recently partnered with ISMG to develop and administer a survey delving into the current state ...