Oak Ridge National Laboratory Webinar | Additive Manufacturing Cybersecurity – It takes a Village

Presented by: Tiffany Potok (Oak Ridge National Laboratory) Cyber security takes a village that encompasses people from all backgrounds, perspectives, and experiences. Additive Manufacturing is revolutionizing the manufacturing industry, while also heavily relying on cyber technology. This intersection of the cyber and physical worlds is a prime example of why cyber security has to be […]

WiCyS NY Metro Affiliate | Ransomware in ICS Environments

Zoom IN

Ransomware attacks on industrial entities are increasing with strains adopting ICS-aware mechanisms to disrupt OT systems. Ransomware operators are incorporating data theft operations into their attack techniques, posing greater concern and legal issues for victims. Please join us for a presentation on the risks and consequences associated with these activities impacting ICS, and how to […]

WiCyS Phoenix AZ Affiliate | Launch Your Cybersecurity Career

Zoom IN

WiCyS Phoenix AZ Affiliate will host a presentation on the plethora of options to look into when making the choice to get into the cybersecurity domain. Our Guest Presenter for this event will be Ally. As a strong female leader in cybersecurity, she is a Red Team Cyber Operator with PAE. To learn more about […]

Target Webinar: Behind the Scenes of Target’s Cyber Fusion Center

Presenters: Target Team Target’s Cyber Fusion Center (CFC) teams operate 24x7 defending Target against cyber threats. The team uses a mix of human intelligence, analytics and state-of-the-art technology to detect, investigate, and contain cyber threats. Learn more about our CFC teams’ capabilities and what happens when they activate the war room as they walk through […]

Workday Webinar | Who Changed my Lock? Keeping Pace with Identity and Access Management

Presented by: Sheetal Kanade (Workday), Shalmali Rajadhyax (Workday) Today, organizations worldwide are combating cybersecurity threats such as customer identity theft, account takeover and privacy abuse. The modern enterprise infrastructure is moving towards cloud technologies, its business model is becoming more global and is leveraging other cloud applications for some of its own business operations. In […]