.png)
Bildungsgipfel für Cybersicherheit in Kalifornien
Informationen zum Sprecher
Verwandte Ereignisse
DOE Cybersecurity and Technology Innovation Conference
The Department of Energy’s DOE Cybersecurity and Technology Innovation Conference will explore the developments and challenges in cybersecurity, technology innovation, workforce development, and critical infrastructure protection. Speakers and attendees will include top thought leaders from across the DOE enterprise, the federal interagency, academia, international partners, and private industry leaders for thoughtful conversations about cybersecurity, modernizing IT and OT environments and solutions, sharing tools, data management, technology, and best practices with the energy industry, and developing technical solutions to meet national challenges.
Black Hat MEA
The Black Hat MEA conference has become the largest cybersecurity event in the region, attracting over 30,000 infosec professionals and featuring more than 250 renowned global speakers and exhibitors. This conference will see cybersecurity’s best and brightest come together to push the space forward. Top infosec trainers, the best solution providers, ICT security research specialists, Black Hat hackers, the C-suite and startups challenging the status quo will shape cybersecurity’s future across the region – with Saudi Arabia leading the charge.
Pittsburgh ISACA Information Security Awareness Day
Thanks in part to corporate and vendor sponsorships, this conference is the top educational value for IS Audit and Cybersecurity professionals in Pittsburgh. Each year the event has grown significantly from the prior year. Over 300 IS Audit and Security professionals from all lines of business in the Tri-State area registered for last year’s virtual event, as well as representatives from other local professional security and audit associations and neighboring ISACA chapters. It is also important to note that our event is attended by many VP, Manager, and Director level personnel that are key decision makers in the IT, IT audit and security departments of their organizations.
Assume Breach.
Auswirkungen minimieren.
Erhöhen Sie die Widerstandsfähigkeit.
Sind Sie bereit, mehr über Zero-Trust-Segmentierung zu erfahren?