Hi [[ session.user.profile.firstName ]]

Tech & Cyber Security Trends

  • Date
  • Rating
  • Views
  • Unified Endpoint Management & Security: A Force Multiplier
    Unified Endpoint Management & Security: A Force Multiplier
    Scott Scheferman, Cylance Director of Global Services; Masataka Hashiguchi, Interfocus Sales Engineer Recorded: Dec 13 2018 56 mins
    Join Interfocus and Cylance for this webinar outlining the workplace productivity gains that your business can realize through an integrated and unified platform delivering both IT asset management and endpoint security. Most IT teams today suffer from "alert fatigue" from the growing number of devices on their network, and spend on average 5-13 hours a week cleaning up compromised endpoints. Scott Scheferman from Cylance and Masataka Hashiguchi from Interfocus will demonstrate how automation and prevention is worth a pound of cure on your endpoints.
  • The Science and Applications of Natural Language Processing
    The Science and Applications of Natural Language Processing
    Peter Fitzsimmons from Contexture & Jess Gulick from Katzcy Recorded: Dec 4 2018 62 mins
    Learn what we mean by “Natural Language Processing (NLP)
    and Machine Learning” and how can these be deployed to
    automatically process, interpret, and organize the growing
    volumes of digital documents and other information critical to
    your business processes.

    In this webinar, we will explain the capabilities and benefits of
    NLP and machine learning and present practical applications in
    several content-intensive areas including policy and compliance,
    media, information services and publishing, legal services, cybersecurity and beyond.
  • Foolproof Digital Identity with Behavioral Biometrics
    Foolproof Digital Identity with Behavioral Biometrics
    Ehab Samy, VP Product Management, Plurilock Recorded: Nov 15 2018 59 mins
    Digital identity authentication can be challenging to do effectively. Join us to learn about the evolution of biometrics technologies, from those that determine who you ARE in the digital realm, to behavioral biometrics that determine your identity based upon what you DO and how you do it. Ehab Samy, Vice President of Product Management for Plurilock, will map which digital identity management mechanisms are best suited for particular environments including law enforcement, airport security, health care, and the workplace.
  • Gaining the Upper Hand on Network Vulnerabilities
    Gaining the Upper Hand on Network Vulnerabilities
    Nathan Vega, VP Product, Columbus Collaboratory Recorded: Nov 8 2018 60 mins
    Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.
  • Career Conversations w/ Kristen Judge, Cybercrime Support Network
    Career Conversations w/ Kristen Judge, Cybercrime Support Network
    Jessica Gulick, MBA | PMP | CISSP Recorded: Oct 18 2018 46 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Guest: Kristin Judge, Author at LinkedIn Learning

    Kristin was elected to serve as a Washtenaw County Commissioner in 2008 and supported the U.S. Department of Homeland Security in growing cybersecurity outreach to state and local government officials. After elected office, she worked at the Center for Internet Security, focusing on connecting state and local governments to federal services and technology needed to improve cyber security.

    As Director of Government Affairs at the National Cyber Security Alliance (NCSA), Kristin worked with Google, FTC, FBI, SBA, DHS, NIST, congressional leaders and other key stakeholders across the country to educate consumers and businesses how to protect sensitive data.

    As a thought leader, Kristin has been seen on the C-SPAN Network, local news outlets and called on by technology publications like SC Magazine and Government Technology to share best practices for online safety; being named an SC Media “Women in IT Security Influencer” in 2017.

    In 2017, Kristin was chosen for the 3rd cohort in the Presidential Leadership Scholars program which is a partnership between the presidential centers of George W. Bush, William J. Clinton, George H.W. Bush, and Lyndon B. Johnson to bring together a select group of leaders who share a desire to create positive change across our Nation.

    To address the needs of cybercrime victims, Kristin recently founded the nonprofit Cybercrime Support Network to connect victims with federal, state and local resources in a coordinated manner.
  • Her View on Finding Funding
    Her View on Finding Funding
    Jessica Gulick, CEO of Katzcy & Gail Ball, Managing Partner of Chestnut Street Ventures Recorded: Oct 18 2018 30 mins
    As a woman entrepreneur, you know firsthand how challenging it can be to get venture funding. Finding the right investors and other sources of capital to get your idea off the ground can be difficult. There are ways to get the funding you need to get your business moving! Please join Jessica Gulick, Owner of Katzcy Consulting, and Gail Ball, Managing Partner of Chestnut Street Ventures, as they share how to navigate the funding challenge and match investors to the needs of your growing technology firm. This 30-minute webinar gives you keen insight and tactics to gain capital, increase funding success and launch your business.
  • Artificial Intelligence & Behavioral Biometrics: Improving Productivity
    Artificial Intelligence & Behavioral Biometrics: Improving Productivity
    Ehab Samy, VP Product Management, Plurilock Recorded: Oct 16 2018 32 mins
    Traditional security and authentication methods are designed to put up stumbling blocks for your employees, challenging them at several points throughout their workday to identify themselves. To do this they must enter, remember, and frequently change passwords, and in the expanding world of two- or multi-factor authentication the enterprise seeks greater security at the further expense of productivity. But traditional passwords and other authentication methods can be compromised, so the impact to your user processes does not always deliver proportional security.

    Artificial intelligence and biometrics can change the authentication game, supporting enhanced security by automatically identifying employee identity without impacting workflows and user processes. Join Ehab Samy, VP Product Management, to learn about applications of biometrics and Artificial Intelligence that smooth your employees’ path to completing any task at work.
  • When Biometrics Simply Don't Cut It
    When Biometrics Simply Don't Cut It
    Ehab Samy, Vice President of Product Management for Plurilock Recorded: Oct 10 2018 61 mins
    Identifying a user through fingerprints, facial recognition or iris scanning is simply not enough for today's digital age. Join us to learn about the shift from point-in-time identification to behavioral biometrics and how it is impacting today's workforce. Ehab Samy, Vice President of Product Management for Plurilock, will explore game-changing practices in continuous authentication and identity management to control access to physical spaces, applications, and government services.
  • Career Conversations w/ Sandra Larson of Looking Glass
    Career Conversations w/ Sandra Larson of Looking Glass
    Jessica Gulick, MBA | PMP | CISSP Recorded: Oct 4 2018 42 mins
    Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?

    Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!

    Guest: Sandra Larson, M.S. Applied Intelligence

    Hosted by Jessica Gulick, MBA | PMP | CISSP

    About the Speaker:

    Sandra Larson is a Senior Director of Intelligence for LookingGlass Cyber Solutions, a cybersecurity company specializing in physical, cyber, and brand risks for small business, global enterprises and government agencies. Sandra has been with LookingGlass for almost ten years, and manages the client relationships for LookingGlass’ clientele in the food and agribusiness, pharmaceutical, retail, and technology industries. Previously, Sandra received her Master of Science in Applied Intelligence from Mercyhurst University.
  • What Your Security Team Needs to Know about GDPR
    What Your Security Team Needs to Know about GDPR
    Richard Stiennon from IT-Harvest & Interfocus Technologies Recorded: Sep 12 2018 41 mins
    The scope of the 435 pages of the EU’s General Data Protection Regulation (GDPR) is vast and has raised the specter of excessive, unforeseen and unintended compliance consequences for companies around the world. In order to ensure individual privacy in the digital realm, there are numerous enterprise security requirements imposed by these regulations with significant compliance concerns, notification requirements and the potential for excessive penalties for non-compliance. Join Interfocus Technologies and security expert Richard Stiennon from IT-Harvest for an overview of GDPR’s implications on your security practices from a people, process and technology point of view. We will review the requirements for and processes to secure your endpoints, monitor and report on malicious user activity, and identify and trace where personal data resides in your network.

Embed in website or blog