Episode 3 - Thwarting Ransomware: A Technical Deep Dive |
|
Jul. 1, 2025 |
Jul. 1, 2025 |
Live Webinar | Vibe Check: The Future of Security in the AI-Coding Era |
|
Jul. 1, 2025 |
Jul. 1, 2025 |
US - Upcoming Webinar: Aquatic Invasive Species (AIS) Alert |
|
Jul. 1, 2025 |
Jul. 1, 2025 |
Safeguarding risky data in SharePoint and OneDrive |
|
Jul. 3, 2025 |
Jul. 3, 2025 |
ACM Designing Interactive Systems (DIS) Conference - July 5-9, 2025 |
Funchal, Madeira, Portugal |
Jul. 5, 2025 |
Jul. 9, 2025 |
Watch LIVE - Securing AI Agents and Preventing Data Exposure in GenAI Workflows |
|
Jul. 7, 2025 |
Jul. 7, 2025 |
DEF CON 32, Nevada, US: 7-10 August, 2025 |
Nevada, US |
Jul. 7, 2025 |
Jul. 10, 2025 |
Webibar - Scaling DevOps in the Enterprise: Speed Without Sacrificing Control - Tuesday, July 8 - 11:00 AM ET |
|
Jul. 8, 2025 |
Jul. 8, 2025 |
Roundtable Talk | Securing Identities in Manufacturing |
|
Jul. 8, 2025 |
Jul. 8, 2025 |
Webinar - The Unified Pipeline: Database & App CI/CD |
|
Jul. 8, 2025 |
Jul. 8, 2025 |
From AI to Scalability: 2025 Trends in Artifact Management - July 08, 2025 |
|
Jul. 8, 2025 |
Jul. 8, 2025 |
Webinar - Accelerating Enterprise DevOps: Governance, Velocity, and Real-World Impact |
|
Jul. 8, 2025 |
Jul. 8, 2025 |
"Secure Your Cloud Databases: Unified Protection for AWS & Azure" |
|
Jul. 9, 2025 |
Jul. 9, 2025 |
Preparing for the Inevitable: Strengthening Incident Response in a Rapidly Evolving Threat Landscape |
|
Jul. 9, 2025 |
Jul. 9, 2025 |
Webinar - Modernizing Healthcare Connectivity - Jul 9, 2025 11:00am ET |
|
Jul. 9, 2025 |
Jul. 9, 2025 |
SANS 2025 SOC Survey Webcast & Forum - Wednesday, 09 Jul 2025 |
|
Jul. 9, 2025 |
Jul. 9, 2025 |
#RISK New York - Exclusive Invite |
Fordham Law School, New York, NY 10023 |
Jul. 9, 2025 |
Jul. 10, 2025 |
A Follow-Up Session: The Five Most Dangerous New Attack Techniques…and What to Do for Each |
|
Jul. 9, 2025 |
Jul. 9, 2025 |
Stolen credentials: The New Front Door to Your Network |
|
Jul. 9, 2025 |
Jul. 9, 2025 |
From Exploits to Forensics Evidence - Unraveling the Unitronics Attack - July 10, 2025 |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Lenovo’s Hybrid AI Factory & Platforms: Strategy and Introduction to Lenovo AI |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Webinar - Outdated and Outmatched: Why Legacy AV Can’t Keep Up |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Podcast: US - Airlines Sold Your Flight Data to DHS—And Covered It Up |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Webinar | A Google Threat Intelligence Deep Dive |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
"Secrets of Securing Code in the AI Age" |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Entra ID security for your Microsoft 365 environment |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Cloud compliance unlocked: Rethinking GRC for data resiliency - June 10, 2025 |
|
Jul. 10, 2025 |
Jul. 10, 2025 |
Pittsburgh Cybersecurity Conference |
Pittsburgh Marriott City Center 112 Washington Place, Pittsburgh, Pennsylvania, USA, 15219 |
Jul. 11, 2025 |
Jul. 11, 2025 |
Cyber Security Training at SANSFIRE 2025 - Washington, DC, US - Mon, Jul 14 - Sat, Jul 19, 2025 |
|
Jul. 14, 2025 |
Jul. 19, 2025 |
Non-Human Identity (NHI) Summit 2025 |
|
Jul. 15, 2025 |
Jul. 16, 2025 |
How to Use Legitimate Interest to Comply With EU GDPR - 15 July 2025 |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Maritime Border Security Technology Workshop - Wednesday, July 16, 2025 · 3:00 p.m. Amsterdam (GMT +2:00) |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Beyond legacy defenses: How AI is reshaping security operations for the modern enterprise |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
How to Spot and Stop Security Risks From Unmanaged AI Tools |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
New Research: Machine Learning Classifiers Don't Need Negative Labels - July 16,2025 |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Live Webinar | Beyond Patching: Understanding Web Exposure and Why It Matters |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Webinar - Leveraging AI for Cybersecurity Workflow Augmentation |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Live Webinar | Next-Gen Cloud Security: Advanced Detection & Response : Jul. 17, 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance - 17 Jul 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Business Application Security – Not to be Overlooked When in Your Security Posture |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
From fragmented to unified: Rethinking network security operations in the AI era |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - The Future of AI-Powered Email Security |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Abnormal Innovate: See the Future of AI Email Security. Build It with Abnormal - July 17 , 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
See bad actors coming - Secure the flavor. Control the brew. Chill with confidence. |
|
Jul. 18, 2025 |
Jul. 18, 2025 |
CIOs, Confidently Create Your GenAI Business Case - July 18, 2025 |
|
Jul. 18, 2025 |
Jul. 18, 2025 |
SANS 2025 Government Security Forum |
|
Jul. 22, 2025 |
Jul. 22, 2025 |
How AI is Affecting the Speed, Scale, and Sophistication of the Threat Landscape |
|
Jul. 22, 2025 |
Jul. 22, 2025 |
Microsoft Cloud & AI Bootcamp - 22 July 2025 – 25 July 2025 |
|
Jul. 22, 2025 |
Jul. 25, 2025 |
CISO Melbourne |
|
Jul. 22, 2025 |
Jul. 23, 2025 |
Webinar - Think Like a Cybercriminal to Stop the Next Potential Attack |
|
Jul. 22, 2025 |
Jul. 22, 2025 |