Date: August 25, 2011
Time: 2:00pm ET
Federal Computer Week has announced a free upcoming webinar entitled, “7 Effective Tips for Securing Sensitive Documents from Internal Breaches“:
Join us for this critical webcast to hear what improved solutions are available to government personnel and contractors to restrict unauthorized access to sensitive data and learn about seven commonly over-looked at-risk areas of vulnerability in your agency.
Attendees will learn:
- an overall strategy encompassing a range of solutions that provide effective protection while lowering costs;
- how to implement a strategy to secure and control your print infrastructure using the latest industry applications; and
- technology to help you achieve energy savings and operational cost reductions at the same time.
The Speaker will be Michael Howard, World Wide Business Development Manager For Security Solutions, Hewlett Packard, Imaging and Printing Group.
McAfee is hosting an interesting looking webinar tomorrow at 2pm EST.
Hacking Exposed Live — Exploiting the Cloud and Virtual Machines
Subject (From host’s site):
During this live webcast, you’ll see exactly how hackers are exploiting cloud computing and virtual machines to harm businesses. We’ll demonstrate the use of commonly available tools they use and how they use them. We’ll reproduce real-world hacks using the same approaches that the hackers used and demonstrate what you can do to prevent them from being used against you.
From the e-mail notification, McAfee will be showing one of the latest hacking techniques used to attack the cloud and VM’s.
Check it out!
A couple interesting webinars are coming up ( All information from presenters website):
Guest Speakers: Ed Skoudis, Joshua Wright, and Kevin Johnson
Date: Wednesday, March 23, 2011
Time: 2PM EDT / 11AM PDT (GMT -4:00, New York)
About this webcast:
During this webcast, security swashbucklers Ed Skoudis, Joshua Wright and Kevin Johnson will return with more penetration testing madness and demonstrate techniques that you can use to proactively assess the security of Cisco networking equipment throughout your organization.
You’ll learn how to…
- Use XSS vulns and Project Yokoso to discover Cisco-centric management interfaces
- Abuse web interfaces for infrastructure control
- Leverage SNMP-to-telnet access escalation for switch pwnage
- Conduct privlege escalation with switch mirror ports
- Engaged in VLAN hopping for fun and profit
- Set up your own virtual routing lab for practice and testing
Join the FS-ISAC and Voltage for a complimentary webcast:
WHEN: Wednesday, March 30, 2011
TIME: 11:00 am EDT / 8:00 am PDT
Recent data breaches at public and private corporations have shown that reliance on perimeter level security is not sufficient – once hackers find a way in they are able to collect data unimpeded. A breach at a notable security company has resulted in potential risks to customers using two-factor authentication however data protection that relies on secrecy or obscurity may not be a good approach. This session will examine potential risks and suggest strategies for pro-actively protecting data in all its forms inside the enterprise.
- March 23, 2011:
- Analyst Webcast: Managing Insiders (Contractors, Vendors, and Employees) in SCADA Environments
- Sponsored By: ArcSight, an HP Company, Industrial Defender , waterfall security
- March 24, 2011:
- Web 2.0 Security: Same old but different
- Sponsored By: SonicWall
- April 07, 2011:
- Improve firewall security odds: Prevent misconfigurations and compliance concerns by automating firewall audits
- Sponsored By: Skybox Security, Inc.
- April 13, 2011:
- Internet Storm Center Threat UpdateISC Webcast
- Sponsored By: Core Security Technologies
- April 14, 2011:
- Analyst Webcast: Addressing the Top 20 Critical Security Controls with SIEM
- Sponsored By: ArcSight, an HP Company
McAfee will be presenting a free mobile threats seminar from their Hacking Exposed series today at 2pm EST.
Information from Website:
“Jailbroken,” “rogue devices,” and “data loss” are terms that will make even the most seasoned information security officer take notice, in addition to external threats posed to mobile devices, today’s mobile workforce are becoming the enterprise’s next line of exposure.
This Hacking Exposed webcast will focus on mobile devices and demonstrate how hackers are intercepting mobile data, gaining control over smartphones and tablets using SMS scams, and unleashing Trojans and malware like Zeus and Zobit to exploit users and gain access to their records.
This is the second conference in as many days that I have seen addressing “jailbroken”, or “rooted” mobile devices. It really looks like this is becoming a serious issue in the corporate environment.
To sign up, go to:
Definitely looks like it is worth checking out. See you there!