Security Technology & Operations - Notes and Videos

A Roadmap to Post-Quantum Cryptography

The impending shift to post-quantum cryptography will redefine digital privacy, secure communications, and cybersecurity infrastructure. Discover and implement more...

Threat Landscape Briefing – May 2025

This monthly recording covers topics such as cyberthreat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies, and exposure...

Threat Landscape Briefing – April 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

Threat Landscape Briefing – March 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Threat Landscape Briefing – February 2025

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...

Threat Landscape Briefing – January 2025

This monthly recording covers topics such as cyber threat trends, nation states, cybercriminals and hacktivists campaigns, data breaches, control strategies, and exposure...

Threat Landscape Briefing – December 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

Custom Vendor Landscape: Enterprise Browsers

Enterprise Browser software is a growing industry, catering to the increasing focus on cybersecurity and zero trust network access.

Custom Vendor Landscape: Patch Management Software

Vulnerability and Patch Management Software is an essential tool in bolstering an organization’s cybersecurity. Vulnerability Management consists of the complete process...

Threat Landscape Briefing – November 2024

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, and hacktivists campaigns, data breaches, control strategies and exposure...
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us