|
CIO Lois Brooks unveils the 2022-2025 IT Strategic Priorities,
School of Education IT Project Manager Jason Erdmann discusses the
school’s Technology Baseline Project, and Chief Information…
|
|
Cybersecurity Governance, Risk, and Compliance (GRC) is often the overlooked and misunderstood subset of cybersecurity. GRC is a way for organizations to meet compliance, manage risk, and provide…
Usage Rights
None (All Rights Reserved)
|
|
What threats do school districts and small businesses face and how can they be prevented? Based on information gleaned from audits performed by UW—Whitewater on local K-12 schools, we’ll…
Usage Rights
None (All Rights Reserved)
|
|
The University of Wisconsin System and University of Wisconsin-Madison will discuss the history of their training and implementation, as well as their use of phishing simulations. Presenters: Jim…
Usage Rights
None (All Rights Reserved)
|
|
We have all been getting email from vendors selling the latest and greatest security product—Zero Trust. The problem is that you cannot buy zero trust, you have to build it. My talk will…
Usage Rights
None (All Rights Reserved)
|
|
Learn how terminology and practices in the cyber world are changing for the better by becoming more inclusive and respectful in this 10/27/2021 presentation by Amanda Thornton and Jason Erdmann.
Usage Rights
None (All Rights Reserved)
|
|
Learn
how to keep your data protected whether you’re working at home or from the
office in this 10-06-2021 presentation by Sean Bossinger and Jason
Erdmann.
Usage Rights
None (All Rights Reserved)
|
|
The first 30 minutes of this session will highlight the key takeaways from this year’s Cybersecurity Forward technical, strategic, and practical presentations. Join us as we discuss…
Usage Rights
None (All Rights Reserved)
|
|
Although DevOps is quickly changing the way that organizations build and deploy web applications using technologies such as Docker containers, there are still the challenges of successfully…
Usage Rights
None (All Rights Reserved)
|
|
This presentation will cover three threat intelligence trends pertaining to criminal cyber threat actors who target academic organizations and their associated tactics, techniques, & procedures.…
Usage Rights
None (All Rights Reserved)
|
|
This session will provide a brief overview of what artificial intelligence (“AI”) is and how it can be used to augment your existing security tools. It will provide some background on AI,…
Usage Rights
None (All Rights Reserved)
|
|
Almost everyone deals with credit card fraud, whether as an individual having fraudulent charges show up on an account or as a business dealing with chargebacks or stolen card notifications. However,…
Usage Rights
None (All Rights Reserved)
|
|
The world is changing, and our traditional security models have failed to keep up. The Zero Trust model is unique because it requires verification of everyone either inside or outside your network,…
Usage Rights
None (All Rights Reserved)
|
|
During this session, we will explore the roots of privacy in the United States and the rise of state-sponsored privacy legislation. We will also explore what the third-party problem is and…
Usage Rights
None (All Rights Reserved)
|
|
Tools are only as powerful as their ability to communicate with one another, and this is true for cybersecurity as well. It is time to empower people in Infosec and cybersec roles with data that…
Usage Rights
None (All Rights Reserved)
|
|
Many organizations have competing risk assessment remediation priorities with business objectives and regulatory requirements that are difficult to compare. Normalization techniques can collect and…
Usage Rights
None (All Rights Reserved)
|