In today's rapidly evolving security landscape, understanding and effectively addressing security threats is of paramount importance, especially when dealing with high-profile individuals such as royalty or VIPs, or high-profile organizations within the critical infrastructure and key resources sectors. This course, designed and delivered by a panel of seasoned security experts, delves into critical areas of […]
Events
Calendar of Events
|
Sunday
|
Monday
|
Tuesday
|
Wednesday
|
Thursday
|
Friday
|
Saturday
|
|---|---|---|---|---|---|---|
|
0 events,
|
0 events,
|
2 events,
-
-
This is another in our FREE series of Global Threat Updates. With wars raging in Ukraine (Europe) and Israel/Gaza (the Middle East), and with ongoing attacks in the Red Sea threatening one of the world’s busiest waterways and critical maritime chokepoints, the world has become a very uncertain and dangerous place. Terrorism has also begun […] |
0 events,
|
1 event,
-
Traditional network security does not keep pace with modern threats. In this session about Zero Trust Architecture (ZTA), we will discuss the basics of Zero Trust Architecture (ZTA) and how it is designed to keep pace with today's threats. We'll explore the key characteristics, origin, and justification of ZTA, along with a few use cases. […] |
1 event,
-
Synthetic Drug Trafficking and Trans-National Organized Crime is a course during which we will explore several of the issues behind the explosion in synthetic drug production and trafficking, and the corresponding record harm it has inflicted upon our communities. We will study why the two main producers of fentanyl and methamphetamine, the Sinaloa Cartel and […] |
0 events,
|
|
0 events,
|
0 events,
|
1 event,
-
Many cryptocurrency confidence scams start “by accident” when scammers send realistic text messages. The message seems intended for somebody else but after you tell the sender they have the wrong number, the person continues the conversation. This contact is no mistake, and they didn’t accidentally text you. You’re being targeted by an international criminal enterprise. […] |
0 events,
|
0 events,
|
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
1 event,
-
FBI Unit Chief Alan McHugh will speak about the FBI’s response to cyber crime. Organizations reaching out to the FBI for help shouldn’t fear loss of control. As the FBI is looking to support victims, not dominate the situation. The FBI’s Cyber Crime Tactical Intelligence Unit resources are focused on analyzing and investigating cybercriminal incidents, […] |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
2 events,
-
Please join us for a two-hour InfraGard online training course focusing on two real-life counter terrorism operations and the essential involvement of the private sector in the success of these actions. Lessons drawn from this training course will emphasize the power of fusion between law enforcement, the private business sector and the community in identifying, […]
-
This webinar will explore the recently enacted SEC Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure Rule, which mandates publicly traded companies to disclose cybersecurity program information in their annual 10-K reports. Additionally, companies must report material cybersecurity incidents in 8-K reports. These new requirements, coupled with uncertainties regarding reporting standards, have heightened concerns about […] |
0 events,
|
0 events,
|