Cyber Security Training at SANSFIRE 2025 - Washington, DC, US - Mon, Jul 14 - Sat, Jul 19, 2025 |
|
Jul. 14, 2025 |
Jul. 19, 2025 |
Webinar - Secure by Design: Threat Modeling for Developers |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Nursing Educator Dr. Randolph Rasch Urges Overhaul of Healthcare Student Compliance Training as Exxat and ComplianceJunction Launch Partners |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
How to Use Legitimate Interest to Comply With EU GDPR - 15 July 2025 |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Live webinar: Taking Control of SaaS Sprawl |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Webinar - Cost-efficient cloud infrastructures for AI workloads |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
CIOs, Use Your Executive Skills to Reduce Friction in the C-Suite |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
The New Normal of Energy: Using flexible energy solutions to de-risk energy security and manage market volatility |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Non-Human Identity (NHI) Summit 2025 |
|
Jul. 15, 2025 |
Jul. 16, 2025 |
Harden your cyber resilience with Rubrik Identity Recovery Services - 15th July 2025 |
|
Jul. 15, 2025 |
Jul. 15, 2025 |
Webinar - Why Smarter Third Party Risk Management (TPRM) Starts with Better Data - Wednesday, 16 July, 1:00 PM CET / 12:00 PM BST |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Webinar - New Research: Machine Learning Classifiers Don't Need Negative Labels Wed, July 16,2025 at 1pm EST |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Beyond Belief: Who owns the fightback against deepfakes and disinformation? |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Webinar : When the Leak Hits: Managing Data Leaks and Cyber Extortion |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Beyond legacy defenses: How AI is reshaping security operations for the modern enterprise |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
The Cybersecurity Training Platform Serious Professionals Are Switching To - Jul 16 2025 |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
GenAI Compute Infrastructure Under Siege: Defending the Foundation of AI |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
"New Research: Machine Learning Classifiers Don't Need Negative Labels" |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
New Research: Machine Learning Classifiers Don't Need Negative Labels - July 16,2025 |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Live Webinar | Beyond Patching: Understanding Web Exposure and Why It Matters |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
How to Spot and Stop Security Risks From Unmanaged AI Tools |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Maritime Border Security Technology Workshop - Wednesday, July 16, 2025 · 3:00 p.m. Amsterdam (GMT +2:00) |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Live Webinar | Vulnerability Management 2.0: Addressing Web Exposure Before It’s Exploited |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Webinar - AI Agents for CIOs: Practical Criteria, Alternatives and Best Practices |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Why the Zero-Click AI Vulnerability in Microsoft 365 is a Game-Changer for Email Security - July 16th, 2025 |
|
Jul. 16, 2025 |
Jul. 16, 2025 |
Webinar - The Future of AI-Powered Email Security |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Navigating the Security Risks of M&A |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
The GCP Jenga Tower: Hacking Millions of Google's Servers With a Single Package |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Threat Actors Unveiled Nation State versus Cyber Crime |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Ransomware Reality Check: Busting Cybersecurity Myths |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Best Practices for Cloud Detection and Response: Real-World Lessons from Multi-Cloud Attacks |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Three Game-Changing Cloud-Native AI Use Cases You Can Implement Now |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
See the Future of AI Email Security. Build It with Abnormal. |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Navigating M&A: What Every Security Leader Needs to Know - July 17th, 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Secure Hybrid AI: How to Responsibly use AI |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Abnormal Innovate: See the Future of AI Email Security. Build It with Abnormal - July 17 , 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Webinar - Leveraging AI for Cybersecurity Workflow Augmentation |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Live Webinar | Next-Gen Cloud Security: Advanced Detection & Response : Jul. 17, 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance - 17 Jul 2025 |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
Business Application Security – Not to be Overlooked When in Your Security Posture |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
From fragmented to unified: Rethinking network security operations in the AI era |
|
Jul. 17, 2025 |
Jul. 17, 2025 |
CIOs, Confidently Create Your GenAI Business Case - July 18, 2025 |
|
Jul. 18, 2025 |
Jul. 18, 2025 |
See bad actors coming - Secure the flavor. Control the brew. Chill with confidence. |
|
Jul. 18, 2025 |
Jul. 18, 2025 |
Achieving Migration Success - 18th July 2025 |
|
Jul. 18, 2025 |
Jul. 18, 2025 |
Live Webinar | Translating Cyber Risk for the Board: Making Human Security a C-Suite Priority |
|
Jul. 22, 2025 |
Jul. 22, 2025 |
Unmasking a VS Code Supply Chain Attack |
|
Jul. 22, 2025 |
Jul. 22, 2025 |
Tech Field Day Insider Webinar — AI, Hyperscale & Mission-Critical: The Next Chapter in Enterprise Storage |
|
Jul. 22, 2025 |
Jul. 22, 2025 |
Practical AI for IT Series : Session 1: Virtual Technician - July 22, 2025 |
|
Jul. 22, 2025 |
Jul. 22, 2025 |
SANS 2025 Government Security Forum |
|
Jul. 22, 2025 |
Jul. 22, 2025 |
Webinar - Think Like a Cybercriminal to Stop the Next Potential Attack |
|
Jul. 22, 2025 |
Jul. 22, 2025 |