Online Cybersecurity Events

ONLINE CYBERSECURITY  EVENTS

Online events, webinars, and other live content relevant today. 

WORK FROM HOME.

The following is a list of curated resources aimed at helping cybersecurity professionals adapt to a remote workforce. As always, if you know of a resource we should add, let us know

SANS Institute
Center for Internet Security

The Center for Internet Security, Inc. (CIS) published the CIS Controls Telework and Small Office Network Security Guide to help combat security concerns affecting network equipment meant for personal or home office use. The following are high impact actions that can be taken by employees to immediately improve the security of their home networks.

Protecting against Cybersecurity Threats when Working from Home

FREE CYBERSECURITY TOOLS.

The following is a list of free cybersecurity tools to help secure a remote workforce. As always, if you know of a resource we should add, let us know

Tool Category

OPEN SOURCE.

Tool Name

Description of tool and why it is useful to help organizations right now.

FREE FOR NOW.

The following are open source cybersecurity tools to help secure a remote workforce. As always, if you know of a resource we should add, let us know

Tool Name

Tool Category

Description of tool and why it is useful to help organizations right now.

The following are commercial tools that are being offered free for now under certain conditions. As always, if you know of a resource we should add, let us know

RECORDED ONLINE CYBERSECURITY EVENTS.

The following is a list of recorded cybersecurity events relevant to helping secure a remote workforce. As always, if you know of a resource we should add, let us know

Threat hunting in the cloud


Cloud paradigms bring new attacks, and new data sources for threat hunting and forensics. Traditional tools are often ill equipped to deal with the rapid changes in cloud deployments. This makes it impossible to address vital use cases that involve threat hunting, investigations, or custom tools and models. In this webinar we will cover how modern security teams use machine learning to enrich both network traffic and logs with attributes specifically for cloud environments. Giving them the tools needed for comprehensive threat hunting.
In this webcast we will discuss:
How cloud telemetry differs from internal network
How attackers leverage new attack vectors in the cloud
Why traditional tools are unable to adapt to cloud deployments
How Vectra empowers security professionals and ties in to their existing workflows

Date/Time (ET)

Speaker

Vectra Security

WhatWorks in High Security Alternatives for Remote Collaboration and Communications

During this SANS WhatWorks webcast, SANS Director of Emerging Security Trends John Pescatore will interview Amanda Schnetzer, Chief Operating Officer of Pointe Bello, a strategic intelligence consulting firm, to gain insight on their business need to securely collaborate across their remote workforce and with their clients, who are often targets of nation states.

Date/Time (ET)

Speaker

Amanda Schnetzer and John Pescatore

Panel Discussion: Maintaining Secure Development Pace in a WFH environment

With the massive transition to a working from home (WFH) environment, we need to make sure we help and guide our remote development teams to work securely.

In this webinar our panel will discuss best practices to enable a more secure WFH development environment as enablement by the evolution of culture, processes and tools in place.

Date/Time (ET)

Speaker

Guy Podjarny

How to secure your cloud infrastructure with Vectra

Cloud attacks are running rampant, and with widespread cloud adoption, many organizations are struggling to keep up. Traditional security solutions offer little help as you move to the cloud, and cloud service provides only secure their own services, even though most customers are adopting a hybrid or multi-cloud approach. Giving customers a solid view of their adversaries.
In this webcast we will discuss:
Why securing Cloud is different from on-prem
Why preventative solutions aren’t sufficient to stop attacks
Why the severity of an attack in the cloud surpasses an on-prem attack
How Vectra Cognito can help stop attacks before they become breaches, regardless of where they happen

Date/Time (ET)

Speaker

Vectra Security

Hacking in the Public Interest

When discussing security technology, we use terms like "attacker" and "defender" without any moral connotations. But in the real world, all security technologies are embedded in some broader social context. It doesn't matter to the cryptography whether the user is a criminal or human rights defender, but it does matter to those who implement and attack the secure communications system.

Date/Time (ET)

Speaker

Bruce Schneier

All The Talks Virtual Conference

A collaborative effort of speakers, organizers and sponsors on all things DevOps, Development & Security

This event will provide a platform for the talks that have been canceled due to the COVID-19 outbreak. Join us for 23.999 hours of talks, panels and activities while raising funds to assist select charities benefiting virus victims.

Date/Time (ET)

Speaker

Various

Defending Your Organization Against COVID-19 Cyber Attacks.

This webinar from Anomali covers the timeline of COVID-19 themed cyber activity, 6,000+ Indicators of Compromise (IOCs) for security teams to leverage, and key MITRE ATT&CK techniques that are being employed.

Date/Time (ET)

Speaker

Anomali

Move Beyond VPN to Secure your Remote Workforce

We’re all juggling numerous challenges from the rapid shift to remote working. The priority for most teams is maintaining productivity. Many organizations looked first to VPNs and quickly scaled their infrastructure to allow remote access to on-site corporate resources.

Date/Time (ET)

Speaker

Forescout

COVID-19 - What Will Attackers Do?

The COVID-19 Coronavirus pandemic provides cyberattackers with opportunities to wreak havoc. The key to thwarting their attacks is knowing how they are leveraging the crisis for their nefarious purposes. And whom better to ask than experts who know how threat actors think and operate?

Date/Time (ET)

Speaker

Chris Roberts

Panel: Vulnerabilities in Remote Workforces

In this Remote Session, our panel of experts will discuss best practices, pitfalls, concerns, myths, and risks associated with managing a remote workforce.

Date/Time (ET)

Speaker

SECUREWORLD

Can Data Centers Handle the Increased Remote Working Caused by Coronavirus?

With Coronavirus having infected 111,000 people worldwide at the time of writing, many companies are enforcing a remote working rule to protect its workforce and minimize the threat of the virus. As such, there will be increased use of online conferencing tools and monitoring tools to remotely manage IT workloads and continue business as usual.

Date/Time (ET)

Speaker

Elisabeth Thomas

Securely Connect and Scale Remote Workforces

During this unprecedented time, ensuring the health and safety of our community is our common responsibility while maintaining business availability & continuity.

Date/Time (ET)

Speaker

Adrian Joubert

CISO Recommendations in Response to COVID-19 and Global Pandemics

Given the global Coronavirus (COVID-19) pandemic, many organizations are moving to a remote workforce in an effort to mitigate the threat posed to the health of their employees and the general public.

Date/Time (ET)

Speaker

Herjavec Group

Securing Your New Remote Workforce: Your Questions Answered from PKI Experts

The Coronavirus (Covid-19) has changed the way we work, seemingly overnight. The pandemic has not only forced IT and security professionals to work remotely, but also deploy remote access for their now at-home employees, without compromising security.

Date/Time (ET)

Speaker

Chris Hickman

5 Ways to Protect Remote Workers From Account Takeover

In today’s enterprise journey to digital transformation, remote work is on the rise. Advancements in technology make it possible for employees to work from anywhere, but also introduce a new set of challenges for IT departments. Unsecured WiFi networks, unmanaged personal mobile devices, and phishing scams make it easy to steal user credentials and difficult to securely manage geographically dispersed teams.

Date/Time (ET)

Speaker

Jerrod Chong

How to Stay Operational during an Outbreak

Protect your Remote and Work-from-Home Employees during the COVID-19 Outbreak

Date/Time (ET)

Speaker

John Aarsen

Running Sensitive Workloads on Untrusted Hosts: Project Enarx

How fully can you trust the host you run your applications on—not just the software stack, but the sysadmins, BIOS, firmware and more? This webcast will show you how Enarx, a Red Hat open-source project, uses trusted execution environments to allow you to run sensitive applications on fundamentally untrusted hosts

Date/Time (ET)

Speaker

Mike Bursell

Coronavirus, Cybercrime, and Education – What You Need to Know

With the coronavirus forcing billions of people into quarantine globally, the world is seeing a huge impact on cybercrime and corona-themed phishing attacks. Now that many schools are closing, sending students home, or offering online-only courses, hackers are finding opportunities to exploit students and schools with fake links and emails from people or sources they “trust”.

This is a special collaboration between MASHAV and Cybint. Its CEO and Cyber Intelligence Expert, Roy Zur, speaks on how the coronavirus is impacting cybercrime specifically in education and how you can protect your schools and students online.

Date/Time (ET)

Speaker

Roy Zur

Secure Your Remote Workforce

Organizations across the globe have asked their workforce to work from home. But most businesses are unprepared for the sudden surge in remote users. The sharp increase is overwhelming existing VPN solutions, creating security challenges, and decreasing workforce productivity.

Date/Time (ET)

Speaker

Bruno Goveas

Coronavirus Pandemic – Cyber Intelligence Fighting the Virus in Cyberspace

In the midst of the Coronavirus pandemic, our society is struggling to adjust to the necessary and unexpected changes. In the information security space, we are prepared for many things, but dealing with a pandemic crisis leaves many unprepared.

Date/Time (ET)

Speaker

Alex Holden

Work From Home Best Practices

This webinar features a conversation about best practices for working from home amid the coronavirus (COVID-19) outbreak. Topics include managing a remote workforce, navigating compliance and labor laws for a remote workforce, rising cybersecurity threats, and much more.

Date/Time (ET)

Speaker

TechLauderdale