Cybersecurity Forward
UW-Madison's Cybersecurity Forward reflects our own relentless drive: To share the essentials, leadership skills, tools and case studies IT and cybersecurity professionals need, at the beginning of their careers and onward. To engage you, with professional expertise from UW System, higher education, government and the private sector. To help us all keep moving forward-at UW-Madison, at our peer higher ed institutions and in the K-12 schools in our communities.
*Please note that due to the rapid pace of technology, some content may no longer be accurate.
**New videos will be posted as they become available
UW-Madison's Cybersecurity Forward reflects our own relentless drive: To share the essentials, leadership skills, tools and case studies IT and cybersecurity professionals need, at the beginning of their careers and onward. To engage you, with professional expertise from UW System, higher education, government and the private sector. To help us all keep moving forward-at UW-Madison, at our peer higher ed institutions and in the K-12 schools in our communities.
*Please note that due to the rapid pace of technology, some content may no longer be accurate.
**New videos will be posted as they become available
UW-Madison's Cybersecurity Forward reflects our own relentless drive: To share the essentials, leadership skills, tools and case studies IT and cybersecurity professionals need, at the beginning of their careers and onward. To engage you, with professional expertise from UW System, higher education, government and the private sector. To help us all keep moving forward-at UW-Madison, at our peer higher ed institutions and in the K-12 schools in our communities.
*Please note that due to the rapid pace of technology, some content may no longer be accurate.
**New videos will be posted as they become available
-
From Laurel Belman August 1st, 2022
At the Florida Department of Transportation, the security team has taken incremental steps to bolster the cyber defense of the organization. The result has been to… -
From Laurel Belman July 25th, 2022
0 0 likes | 48 48 playsCybersecurity Governance, Risk, and Compliance (GRC) is often the overlooked and misunderstood subset of cybersecurity. GRC is a way for organizations to meet… -
From Laurel Belman July 18th, 2022
0 0 likes | 18 18 playsWhat threats do school districts and small businesses face and how can they be prevented? Based on information gleaned from audits performed by UW—Whitewater on… -
From Laurel Belman July 11th, 2022
0 0 likes | 38 38 playsThe University of Wisconsin System and University of Wisconsin-Madison will discuss the history of their training and implementation, as well as their use of phishing… -
From Laurel Belman July 11th, 2022
We have all been getting email from vendors selling the latest and greatest security product—Zero Trust. The problem is that you cannot buy zero trust, you have to… -
From Laurel Belman October 4th, 2021
The first 30 minutes of this session will highlight the key takeaways from this year’s Cybersecurity Forward technical, strategic, and practical presentations.… -
From Laurel Belman September 29th, 2021
Although DevOps is quickly changing the way that organizations build and deploy web applications using technologies such as Docker containers, there are still the… -
From Laurel Belman September 21st, 2021
This presentation will cover three threat intelligence trends pertaining to criminal cyber threat actors who target academic organizations and their associated tactics,… -
From Laurel Belman September 13th, 2021
This session will provide a brief overview of what artificial intelligence (“AI”) is and how it can be used to augment your existing security tools. It will… -
From Laurel Belman September 8th, 2021
Almost everyone deals with credit card fraud, whether as an individual having fraudulent charges show up on an account or as a business dealing with chargebacks or… -
From Laurel Belman August 17th, 2021
The world is changing, and our traditional security models have failed to keep up. The Zero Trust model is unique because it requires verification of everyone either… -
From Laurel Belman August 10th, 2021
During this session, we will explore the roots of privacy in the United States and the rise of state-sponsored privacy legislation. We will also explore what the… -
From Laurel Belman August 2nd, 2021
Tools are only as powerful as their ability to communicate with one another, and this is true for cybersecurity as well. It is time to empower people in Infosec and… -
From Laurel Belman July 21st, 2021
Many organizations have competing risk assessment remediation priorities with business objectives and regulatory requirements that are difficult to compare.… -
From Laurel Belman July 19th, 2021
How can we help reduce the risk associated with privileged accounts? The concept of Credential Tiering can help. This presentation will provide an overview of Credential…