Discover and learn how to establish your cyber security posture and cyber compliance with the GLESEC’s Seminar Program Series.
Stay Ahead of Cyberattacks with Orchestrated Breach & Attack Simulation
This webinar will present current threats, how a breach & attack simulation platform operates and the integration of this to GLESEC’s Orchestration platform and services.
CYBER RANGE HACKATON - RED TEAM
This war-games’ based Cyber-Range will introduce players to a red-team exercise and GLESEC’s Gamified Cyber Range platform.
Orchestrated Breach & Attack Simulation and Lifetime Vulnerability Handling and Compliance Impact
This webinar will present risks and state of readiness of organizations and how breach & attack simulation, vulnerability testing, Compliance impact and GLESEC’s Orchestration platform and services respond to these.
Join us for a special digital edition of Cybertech for Latin America on August 11, 2020. Our new digital platform is built with audience engagement in mind, connecting you with leading government and industry speakers as well as other cybersecurity professionals across Latin America.
Orchestration for the Improvement of the security Posture and Optimization of Costs
In this seminar we are going to present our cost optimization model for the consolidation and orchestration of security services. Participants will learn how GLESEC’s holistic platform responds to security and regulatory needs in a comprehensive way and how this same model can provide a reduction in security operating costs.
9:00 AM EST
CYBER RANGE HACKATON - RED TEAM
This war-games’ based Cyber-Range will introduce players to a red-team exercise and GLESEC’s Gamified Cyber Range platform. 3 Hours of gamified fun!
Be the first of 25 to sign up at no cost! $200 per person afterwards.
Cyber Security: The Threat to your companies and the economy. A conference in collaboration of the Florida Industry Association; Florida Department of Economic Opportunity; Workers Compensation Institute and Florida Makes
Orchestrated Threat Mitigation, Incident Handling and Compliance impact
This webinar will present current threats and how GLESEC’s advanced endpoint detection and response, and Orchestration platform and services respond and how compliance is addressed.
Orchestrated Data Leakage Monitoring and Protection - Beyond DLP and Compliance Impact
This webinar will present current data leakage threats and the impact on compliance. GLESEC will address how its Orchestration platform combined with the DLP monitoring and DLP protection services work together and how compliance is addressed.
Orchestrated and Dynamic GAP Analysis
This session of the Compliance Webinar Series will address GLESEC’s Orchestrated and dynamic, multi-standard GAP service. Attendees will see a demonstration of how this can be applied to reduce costs of compliance testing while fulfiling compliance requirements and matching these to cybersecurity capabilities. The session will also demonstrate the full cycle of testing and remediation.
Orchestrated Breach and Attack Simulation - Recon
As part of the Vulnerability Handling Webinar Series we will present a holistic approach to preventive security using breach and attack simulation multi-vector simulated attacks and introduce the RECON vector to precede the full attack chain. The presentation will cover the user and back-end operations perspective for a full lifecycle process.
Orchestrated Threat Intelligence Deep and Dark Web
As part of the Threat Mitigation Webinar Series we will present a holistic approach to mitigation by using information on emerging or immediate threats identified in the deep and dark web. The presentation and demonstration will show how the organization interacts with the back-end operations staff and analyst and how the platforms are used to monitor and investigate.
Orchestrated Third Party Validation
This session of the Compliance Webinar Series will address GLESEC’s Orchestrated Third Party Validation monitoring and investigation in a full lifecycle demonstration.
Orchestrated on-going Breach and Attack Simulation and Vulnerability Testing
As part of the Vulnerability Handling Webinar Series we will present a holistic approach to preventive security using breach and attack simulation multi-vector simulated attacks full attack chain and vulnerability testing in a consolidated approach with actual measure of risk in-mind. The presentation will cover the user and back-end operations perspective for a full lifecycle process.