This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
ON DEMAND: This webinar will focus on strategies that organizations can take to prevent gun violence from potentially affecting their employees, facilities, and visitors.
ON DEMAND: In just the past few years, the security landscape has withstood significant changes driven by shifting work environments due to COVID-19 and a rise in digital and physical threats such as ransomware, IT disruptions, extreme weather, and violent attacks.
ON DEMAND: This webinar will focus on challenges in the cybersecurity talent gap and specific strategies organizations and security leaders can take to recruit, retain and develop cyber talent.
ON DEMAND: The Joint Committee on the Research Environment (JCORE) recently recommended safety and security practices that will ultimately require institutions to “maintain international travel policies for faculty and staff” going abroad.
ON DEMAND: Security Operations Centers (SOCs) are a crucial component of safety and security culture. They support many strategic business objectives, from lowering costs and minimizing risk to improving employee trust and morale.
ON DEMAND: In this talk, Stephen Magill will share insights from existing software supply chain research along with lessons learned from Log4j and Spring4Shell to break down how to change your software supply management practices for a more secure life cycle or SDLC.