Security Testing Videos by Many Security Professionals (WebCast)Core SEC

* December 15, 2010
Late Breaguide Computer Attack Vectors Webcast
Sponsor: Core Security Technologies
Moderator: One of the PaulDotCom crew.
CLICK HERE FOR A RECORDING OF THIS EVENT
* December 8, 2010
THOUGHT LEADERSHIP ROUNDTABLE The Top 5 Application Security Oversight’s
Moderator: Rich Mogull
Sponsor: SonicWALL
CLICK HERE FOR A RECORDING OF THIS EVENT
* November 23, 2010
Security for Virtualized IT Thought Leadership Roundtable webcast

Moderator: Mark Bouchard
Sponsor: RSA
CLICK HERE FOR A RECORDING OF THIS EVENT
* November 17, 2010
Late Breaguide Computer Attack Vectors Webcast
Sponsor: Core Security Technologies
Moderator: One of the PaulDotCom crew.
CLICK HERE FOR A RECORDING OF THIS EVENT
* November 11, 2010
8 Steps to Protecting PII (Personally Identifiable Information)
Sponsor: Sophos

Speaker: John MetzgerCLICK HERE FOR A RECORDING OF THIS EVENT
* October 27, 2010
Late Breaguide Computer Attack Vectors Webcast
Sponsor: Core Security Technologies
Moderator: One of the PaulDotCom crew.
CLICK HERE FOR A RECORDING OF THIS EVENT
* October 5, 2010
THOUGHT LEADERSHIP ROUNDTABLE Simple Strategies to Stop Data Leakage
Moderator: Rich Mogull
Sponsor: Patriot Technologies & Websense
Speaker: Joe Howard, Websense; Robert Hamilton, Symantec
CLICK HERE FOR A RECORDING OF THIS EVENT
* September 29, 2010
Late Breaguide Computer Attack Vectors Webcast
Moderator: One of the PaulDotCom crew.
Sponsor: Q1 Labs
Speaker: Brian Mehlman
CLICK HERE FOR A RECORDING OF THIS EVENT
* September 28, 2010
Mobile Madness! Management and Security Strategies for Conquering the Mobile Device Explosion

Speaker: David Goldschlag CTO, Mobile Technology, McAfee
CLICK HERE FOR A RECORDING OF THIS EVENT
* August 26, 2010
Fake Anti-Virus: What You Need to Know
Sponsor: Sophos
Speaker:Richard Wang
CLICK HERE FOR A RECORDING OF THIS EVENT
* August 25, 2010
Late Breaguide Computer Attack Vectors Webcast
Sponsor: Core Security Technologies
Moderator: One of the PaulDotCom crew.
CLICK HERE FOR A RECORDING OF THIS EVENT
* August 18, 2010
THOUGHT LEADERSHIP ROUNDTABLE
Best Practices in Log Management
Moderator: Rich Mogull.
Panelist:Varun Kohli, ArcSightJohn Cloonan, Tripwire.
Sponsor: Tripwire;
CLICK HERE FOR A RECORDING OF THIS EVENT
* July 28, 2010
Late Breaguide Computer Attack Vectors Webcast
Moderator: One of the PaulDotCom crew.
Sponsor: Thawte
CLICK HERE FOR A RECORDING OF THIS EVENT
* July 21, 2010
THOUGHT LEADERSHIP ROUNDTABLE
Security for Web 2.0
Sponsor: Core Security Technologies, , McAfee, SonicWALL
Moderator: Mark Bouchard
Panelist: Tim Roddy , McAfee
CLICK HERE FOR A RECORDING OF THIS EVENT
* July 14, 2010
THOUGHT LEADERSHIP ROUNDTABLE
SIEM Best Practice
Moderator: Mark Bouchard
Panelists:Dwayne Melancon , Tripwire; Dan Breslin , RSA
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 30, 2010
Late Breaguide Computer Attack Vectors Webcast
Sponsor: Core Security Technologies
Moderator: One of the PaulDotCom
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 23, 2010
THOUGHT LEADERSHIP ROUNDTABLEWhat is Endpoint Security?
Moderator: Rich Mogull
Sponsors:BigFix, Patriot Technologies
Panelists: Kimber Spradlin, BigFix; Vik Phatak, NSS Labs
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 16, 2010
THOUGHT LEADERSHIP ROUNDTABLEBest Practices in Identity Management
Moderator: Mark Bouchard
Sponsor: ArcSight, Aveksa
Speaker: Ryan Kalember, ArcSight; Brian Cleary, Aveksa; Kurt Johnson, Courion
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 15, 2010
LogLogic Presents “Logging Everything: IT Best Practice & Compliance (The Importance of IT to Internal Auditors)”.
Sponsor: LogLogic
Speaker: Andy Morris, LogLogic
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 9, 2010
Sophos, Custom Webcast
Prescription for Compliance
Speaker: Nagraj Seshadri, Senior Security Adviso
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 8, 2010
Core Security Technologies Custom Webcast
Penetration Testing in Healthcare
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 2, 2010
RSA, the Security Division of EMC reveals new research on SIEM usage.

Sponsor: RSA
Speakers: Debbie Umbach, RSA; Rich Mogull, Whitehatworld.com
CLICK HERE FOR A RECORDING OF THIS EVENT
* May 26, 2010
Late Breaguide Computer Attack Vectors Webcast
Moderator: One of the PaulDotCom crew.
Sponsor: LogLogic
CLICK HERE FOR A RECORDING OF THIS EVENT
* May 19, 2010
THOUGHT LEADERSHIP ROUNDTABLE The Top 5 PCI Mistakes
Moderator: Rich Mogull
Sponsor: LogLogic, Qualys, Tripwire
Speaker: Jim Bibles, Qualys; Andy Morris, LogLogic; Cindy Valladares, Tripwire;
CLICK HERE FOR A RECORDING OF THIS EVENT
* May 12, 2010
THOUGHT LEADERSHIP ROUNDTABLE The Future of Firewalls
Moderator: Mark Bouchard
Sponsor: McAfee, SonicWALL
Speaker: Greg Brown, McAfee; Matt Dieckman, SonicWALL
CLICK HERE FOR A RECORDING OF THIS EVENT
* April 28, 2010
Late Breaguide Computer Attack Vectors Webcast
Moderator: One of the PaulDotCom crew.
Sponsor: LogLogic
Speaker: Andy Morris
CLICK HERE FOR A RECORDING OF THIS EVENT
* April 27, 2010
Mortman Briefing
Mortman Briefing – Best Practices in Penetration Testing
Moderator: David Mortman
Sponsor: Core Security
CLICK HERE FOR A RECORDING OF THIS EVENT
* April 21, 2010
Security Management: How to Become Predictive vs. Reactive
Speaker: Tom Turner, Senior Vice President, Q1 Labs
CLICK HERE FOR A RECORDING OF THIS EVENT
* THOUGHT LEADERSHIP ROUNDTABLE
Essentials of Patch Management
Moderator: Rich Mogull
Panelist: Vikram Phatak ,NSS Labs; Sandy Hawke, BigFix

CLICK HERE FOR A RECORDING OF THIS EVENT
* March 31, 2010
Late Breaguide Computer Attack Vectors Webcast
Moderator: Paul Asadoorian
CLICK HERE FOR A RECORDING OF THIS EVENT
* March 30, 2010
Penetration Testing in a Wireless World
Sponsor: Core Technologies
Moderator: Paul Asadoorian
CLICK HERE FOR A RECORDING OF THIS EVENT
* March 24, 2010
THOUGHT LEADERSHIP ROUNDTABLE
The Future of PCI DSS
Moderator: Rich Mogull
Sponsor: ArcSight, eIQnetworks, RSA, Tripwire
Panelists: Ansh Patnaik, ArcSight; John Linkous, eIQnetworks; Don MacLennan, RSA; Cindy Valladares, Tripwire
CLICK HERE FOR A RECORDING OF THIS EVENT
* March 17, 2010
THOUGHT LEADERSHIP ROUNDTABLE
Repel the Leprechauns! The Top 5 Intrusion Prevention Essentials
Moderator: Mark Bouchard
CLICK HERE FOR A RECORDING OF THIS EVENT
* March 10, 2010
RSA Custom webcast
Preserve Your Security Budget: Cost-effectively Secure Your Environment and Communicate ROI
Speaker: Rachael Stockton, Principal Product Marketing Manager, RSA, The Security Division of EMC
CLICK HERE FOR A RECORDING OF THIS EVENT
* March 3, 2010
Prism Microsystems Custom webcast
CLICK HERE FOR A RECORDING OF THIS EVENT
* February 24, 2010
Late Breaguide Computer Attack Vectors Webcast
Moderator: Paul Asadoorian
Sponsor: WebSense, Patriot technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
* February 23, 2010
RSA Custom webcast
RSA 2010 Fraud Predictions and Online Consumer Security
Speaker: Seth Geftic Senior Manager, Identity Protection
CLICK HERE FOR A RECORDING OF THIS EVENT
* February 17, 2010
THOUGHT LEADERSHIP ROUNDTABLE
The Continuing Evolution of SIEM
Moderator: Mark Bouchard
Sponsors:ArcSight, NitroSecurity, Tripwire and Q1 Labs
Speakers:Glen SharlunArcSight; Mel Shakir, NitroSecurity; Dwayne Melançon, Tripwire; Dwayne Melançon, Chris Poulin, Q1 Labs.
CLICK HERE FOR A RECORDING OF THIS EVENT
* January 27, 2010
LATE BREAKING COMPUTER ATTACK VECTORS hosted by Paul Asadoorian
Sponsor: Core Securities
Moderator: Alex Horan
CLICK HERE FOR A RECORDING OF THIS EVENT
* January 19, 2010
Next-Gen SIEM: 10 Minutes to Value – Confirmed, Plausible or Busted? T
Speaker: Chris Poulin
Sponsor: Q1 Labs
CLICK HERE FOR A RECORDING OF THIS EVENT
* December 16, 2009
LATE BREAKING COMPUTER ATTACK VECTORS hosted by Paul Asadoorian
Sponsor: Qualys
CLICK HERE FOR A RECORDING OF THIS EVENT
* December 15, 2009
THOUGHT LEADERSHIP DISCUSSION
Security for Web2.0 and Other Collaboration Technologies
Sponsor: McAfee
Speaker: Tim Roddy
CLICK HERE FOR A RECORDING OF THIS EVENT
* December 9, 2009
McAfee and NSS Labs Network IPS webcast
Straight Talk with NSS Labs on Evaluating a Network IPS
Speakers: Vik Phatak: President, NSS Labs; Greg Brown: Sr. Director, Network Defense, McAfee
CLICK HERE FOR A RECORDING OF THIS EVENT
* December 2, 2009
Custom Webcast Sponsored by Prism Microsystems – Best Practices for Monitoring USB Activity and Keeping Critical Data Secure
Speaker: A.N. Ananth
CLICK HERE FOR A RECORDING OF THIS EVENT
* November 18, 2009
LATE BREAKING COMPUTER ATTACK VECTORS hosted by Paul Asadoorian
Sponsor: Thawte
CLICK HERE FOR A RECORDING OF THIS EVENT
* October 28, 2009
LATE BREAKING COMPUTER ATTACK VECTORS hosted by Paul Asadoorian
Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
* October 21, 2009
THOUGHT LEADERSHIP ROUNDTABLE
Data Leakage
Sponsor: Courion, Symantec
Moderator: Rich Mogull
Panelist: Kurt Johnson, Courion; Kevin Rowney; Symantec

CLICK HERE FOR A RECORDING OF THIS EVENT
* September 30, 2009
THOUGHT LEADERSHIP ROUNDTABLE
Data Leakage
Sponsor: Courion, Symantec
Moderator: Rich Mogull
Panelist: Kurt Johnson, Courion; Kevin Rowney; Symantec
CLICK HERE FOR A RECORDING OF THIS EVENT
* September 23, 2009
THOUGHT LEADERSHIP ROUNDTABLE
The Role of IT Security in SOX Compliance
Sponsor: nCircle, Qualys, ArcSight
Moderator: Mark Bouchard
Speaker: Jason Creech, Qualys; Ansh Patnaik, ArcSight; Corey Bodzin, nCircle
CLICK HERE FOR A RECORDING OF THIS EVENT
* September 16, 2009
Is Log Management the Killer App for Cloud Computing?
Sponsor: Alert Logic
Speakers: Randy Rosenbaum, Alert Logic; Steve Smith, Alert Logic;
CLICK HERE FOR A RECORDING OF THIS EVENT
* September 15, 2009
It’s Here! Identity and Information Security Integration
Presented by: Courion and RSA
Speakers: Jon Oltsik, Enterprise Strategy Group; Kurt Johnson, Courion; Sam Curry, RSA;
CLICK HERE FOR A RECORDING OF THIS EVENT
* September 09, 2009
THOUGHT LEADERSHIP ROUNDTABLE
Thought Leadership The Evolution of SIEM, Cutting Through the Noise to Meet Customer Needs
Moderator: Mark Bouchard
Sponsor: Nitro Security, ArcSight, LogLogic, netForensics, RSA
Panelists: Reed Henry ArcSight; Don MacLennan, RSA; Mark Seward, LogLogic; Michael Leland, NitroSecurity; Tracy Hulver, netForensics;
CLICK HERE FOR A RECORDING OF THIS EVENT
* August 26, 2009
LATE BREAKING COMPUTER ATTACK VECTORS hosted by Paul Asadoorian
Sponsor: eIQ Networks
Speaker: John Linkous, eIQ Networks
CLICK HERE FOR A RECORDING OF THIS EVENT
* August 4, 2009
The Mortman Briefing
Risk Management Moving Beyond Red, Yellow, Green
Sponsor: Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
* July 29, 2009
LATE BREAKING COMPUTER ATTACK VECTORS
hosted by Paul Asadoorian
Sponsor: Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
* July 22, 2009
THOUGHT LEADERSHIP ROUNDTABLE
Vulnerability Management
Sponsor: Rapid 7, Symantec
Panelists: Ben Greenbaum, Symantec; Ron Gula, Tenable; Sheldon Malm, Rapid 7;Tim Erlin, nCircle
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 30, 2009
RSA Authentication Decision Tree Webcast
Sponsor: RSA
Speaker: Karen Kiffney
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 24, 2009
LATE BREAKING COMPUTER ATTACK VECTORS hosted by Paul Asadoorian
Sponsor: Symantec
Speaker:Susan Van Ness
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 23, 2009
Two-Horned Monster: Web to Browser Nightmares
Host: Deb Radcliff
Sponsor: Thawte
CLICK HERE FOR A RECORDING OF THIS EVENT
* June 17, 2009
THOUGHT LEADERSHIP ROUNDTABLE – SIEM (Security Information and Event Management)
Moderator: Mark Bouchard
Sponsor: eIQ Networks, Q1 Labs, eIQ Networks, LogLogic, RSA, ArcSight
Panelist:Brendan Hannigan, Q1 Labs; Mark Seward,LogLogic; Mike Rothman, eIQ Networks; Paul Stamp, RSA; Reed Henry, ArcSight
CLICK HERE FOR A RECORDING OF THIS EVENT
* May 27, 2009
LATE BREAKING COMPUTER ATTACK VECTORS hosted by Paul Asadoorian
CLICK HERE FOR A RECORDING OF THIS EVENT
* May 20, 2009
THOUGHT LEADERSHIP ROUNDTABLE
Innovation in Endpoint Security
Moderator: Rich Mogull
Vendor Sponsor: Lumension, Symantec
Panelist: Don Leatham, Lumension; John Harrison, Symantec
CLICK HERE FOR A RECORDING OF THIS EVENT
* May 13, 2009
Top Ten Best Practices to Stop Insider Threats” presented by Prism Microsystems
Sponsor: Prism Microsystems
CLICK HERE FOR A RECORDING OF THIS EVENT
* May 12, 2009
THOUGHT LEADERSHIP ROUNDTABLE
Log Management
Moderator: Mark Bouchard
Sponsor: LogLogic, ArcSight; Alert Logic, RSA
Panelists:Sudha Iyer, LogLogic; Hugh Njemanze, ArcSight; Misha Govshteyn, Alert Logic; Paul Stamp, RSA
CLICK HERE FOR A RECORDING OF THIS EVENT
* April 29, 2009
LATE BREAKING COMPUTER ATTACK VECTORS hosted by Paul Asadoorian
CLICK HERE FOR A RECORDING OF THIS EVENT
* April 14, 2009
Triple Play w/Paul Asadoorian, John Strand & Larry Pesce
Best Of Web Application Penetration Testing Tools
Sponsor: Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
* April 8, 2009
The Mortman Briefing
Metrics for the Real World
Sponsor: eIQ Networks
CLICK HERE FOR A RECORDING OF THIS EVENT
* March 25, 2009
LATE BREAKING COMPUTER ATTACK VECTORS hosted by Paul Asadoorian
Sponsor:Thawte
CLICK HERE FOR A RECORDING OF THIS EVENT
* March 10, 2009
TOP 10 SECURITY BREACHES
Sponsor: ArcSight
Panelist: Davi Ottenheimer
CLICK HERE FOR A RECORDING OF THIS EVENT
* March 4, 2009
THOUGHT LEADERSHIP ROUNDTABLE
Moderator: Rich Mogull
Compliance/GRC
Sponsor: LogLogic, Symantec
Panelist: Sudha Iyer, LogLogic; Jim Hurley, Symantec; Mark Wood, nCircle
CLICK HERE FOR A RECORDING OF THIS EVENT
* February 25, 2009LATE BREAKING COMPUTER ATTACK VECTORS
hosted by Paul Asadoorian
Sponsor: Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
* February 11, 2009THOUGHT LEADERSHIP ROUNDTABLE
The Cloud Based Approach for Delivering Security
Moderator: Rich Mogull
Sponsor: AlertLogic
Panelist: Misha Govshteyn, Alert Logic;John Pirc, IBM;Nir Zuk, Palo Alto Networks.
NO RECORDING AVAILABLE FOR THIS EVENT
* February 10, 2009
Whitepaper Delivery Webcast
“Security Beyond the Windows Event Log – Monitoring Ten Critical Conditions”
Sponsor: Prism Microsystems
Panelist:Isaac Thompson, Prism
CLICK HERE FOR A RECORDING OF THIS EVENT
* February 4, 2009
ProCon w/Chris Nickerson & Max Caceres
Pen Testing Product Vs. Pen Testing Service
Sponsor: Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
* January 28, 2009
LBCAV hosted by Paul Asadoorian
Sponsor:Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
* January 21, 2009
THOUGHT LEADERSHIP ROUNDTABLE
Database Security
Sponsor: Rapid7, Tizor, Application Security, Imperva, Secerno, Guardium.
CLICK HERE FOR A RECORDING OF THIS EVENT
Moderator: Rich Mogull
Panelist: Rapid7′s Corey Thomas,Tizor’s Prat Moghe, Application Security’s Josh Shaul, Imperva’s Dean Ocampo, Secerno’s James Spooner, Guardium’s Phil Neray
* January 13, 2009
Triple Play w/Paul Asadoorian, John Strand & Larry Pesce Best of Network Penetration Testing Tools
CLICK HERE FOR A RECORDING OF THIS EVENT
Sponsor: Core Security Technologies
* December 23, 2008
WHW Monthly Update – Late-Breaguide Computer Attack Vectors
CLICK HERE FOR A RECORDING OF THIS EVENT
Sponsor: Core Security
* December 3, 2008
Policy Compliance Thought Leadership Roundtable
CLICK HERE FOR A RECORDING OF THIS EVENT
Moderator: Mark Bouchard
Sponsor: Courion, Qualys, Symantec andTenable
Panelists: Terry Ramos, Qualy’s; Jim Hurley, Symantec;, Marcus Ranum, Tenable; Kurt Johnson
* Nov 25, 2008
WHW Monthly Update – Late-Breaguide Computer Attack Vectors
Sponsor: ArcSight
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Brian Contos
* Nov 19, 2008
eIQnetworks custom webcast – 10 Reasons your Existing SIEM Sucks
Sponsor: eIQnetworks
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker Michael Rothman
* Nov 6, 2008
Forensics are Not Enough! Case Studies in Proactive Network Defense using Security Information and Event Management (SIEM) Technology
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Michelle Dickman
Sponsor:TriGeo
* Nov 5, 2008
Thought Leadership Roundtable Webcast – Data Leakage.
Moderator: Richard Mogull.
Sponsored by: Secure Computing, Courion, Vericept, Proofpoint
CLICK HERE FOR A RECORDING OF THIS EVENT
Panelists: Kurt Johnson, Courion; Ken Rutsky, Secure Computing; John Amaral, Vericept
; Rami Habal, Proofpoint
Register Here
* Oct 29, 2008
WHW Monthly Update – Late-Breaguide Computer Attack Vectors
Sponsored by: Breach Security
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Mike Pierce, Breach Security.
* October 23, 2008
Anatomy of an Attack – Detecting and Responding to Fraudulent Activity
Sponsor: ArcSight
Speaker:Brian Contos, Chief Security Officer,ArcSight
Colby Derodeff , Enterprise Solutions Strategist, ArcSight
CLICK HERE FOR A RECORDING OF THIS EVENT
* October 15, 2008
Vulnerability Management Thought Leadership Roundtable
Moderator: Rich Mogull
Sponsor: Core Security Technologies, Rapid7
CLICK HERE FOR A RECORDING OF THIS EVENT
Panelist: Fred Pinkett, Rapid7 CTO Tas Giakouminakis
* October 14, 2008
Using SIEM to meet PCI Requirements – Live Presentation
Sponsor: Trigeo
CLICK HERE FOR A RECORDING OF THIS EVENT
Speakers: Michael Maloof, Rob Johnson
* Sep 24, 2008
WHW Monthly Update – Late-Breaguide Computer Attack Vectors
Speaker: Thomas Maufer
Sponsored by: Mu Dynamics
CLICK HERE FOR A RECORDING OF THIS EVENT
* Sep 17, 2008
Thought Leadership Roundtable Webcast – Web Application Security.
Moderator: Richard Mogull.
Sponsored by: Secure Computing, Cenzic, Imperva and Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
Panelist: Scott Montgomery, VP, Product Management; Fred Pinkett, Core Security Technologies; Sharon Besser, Imperva; Lars Ewe, Cenzic; Ron Gula, Tenable Security
* Sep 10, 2008
Thought Leadership Roundtable Webcast – Mobile Encryption.
Moderator: Richard Mogull
Sponsor: Credant, Utimaco, Seagate Technology
CLICK HERE FOR A RECORDING OF THIS EVENT
Panelist: Chris Burchett, Dr. Michael Willett, Malte Pollmann
* Sep 9, 2008
How to Stop Advanced Persistent Threats from Evading Detection
Sponsor: NetWitness
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Amit Yoran, CEO of Netwitness Corporation
* Aug 27, 2008
WHW Monthly Update – Late-Breaguide Computer Attack Vectors
Sponsor: ArcSight
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Brian Contos
* Aug 13, 2008
Forensics are Not Enough! Case Studies in Proactive Network Defense using Security Information and Event Management (SIEM) Technology
Sponsor: TriGeo
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Michelle Dickman
* Aug 6, 2008
Vulnerability Management Thought Leadership Roundtable
Sponsor: Qualys, Tenable, Rapid7, Lumension Security
CLICK HERE FOR A RECORDING OF THIS EVENT
Moderator:Mark Bouchard
Panelists: Ron Gula, Tas Giakouminakis, Jonathan Bitle, Paul Zimski
* Jul 30, 2008
WHW Monthly Update – Late-Breaguide Computer Attack Vectors
Sponsor: Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker:Matt Hines
* Jul 16, 2008 – Thought Leadership Roundtable Webcast – Phishing
Sponsor:Secure Computing
CLICK HERE FOR A RECORDING OF THIS EVENT
Moderator:Mark Bouchard
Panelist:Jonathan Zdziarski, Research Scientist for Secure Computing; Ron Gula, Tenable; Andy Klein, SonicWALL.
* June 25, 2008 Merging Traditional and Whitelist Approaches in Security Information Management: A new model for an increasingly dangerous world.
Sponsor:Prism Microsystems
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker:A. N. Ananth, CEO, Prism Microsystems, Inc.
* June 18, 2008 WHW Monthly Update – Late-Breaguide Computer Attack Vectors
Sponsor:AlertLogic
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker:Randy Rosenbaum
* May 28, 2008 LBCAV Webcast hosted by Paul Asadoorian
Sponsor:Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Michael Yaffe
* Jun 3, 2008 Put your money where your threats are…Top five reasons to allocate budget dollars to application security..
Sponsor: Secure Computing
CLICK HERE FOR A RECORDING OF THIS EVENT
Speakers: Secure Computing’s Andrew Stevensand WhiteHatWorld.com’s Chris Nickerson
* May 22, 2008 Custom Webcast – Worst Practices’ of Log Management
Sponsor: LogLogic
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Dr. Anton Chuvakin
* May 15, 2008 Custom Webcast
“Integrating Web Applications into Your Vulnerability Management Program”
Sponsor: Core Security Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Rich Mogull
* May 7, 2008
Intrusion Prevention Thought Leadership Roundtable Webcast.
Sponsor: SourceFire, Core Security Technologies, TippingPoint
CLICK HERE FOR A RECORDING OF THIS EVENT
Panelists:Sourcefire Security Fellow Jason Brvenik, McAfee Product Line Executive William Boyle, Core Security Technology’s Matt Hines, and TippingPoint’s Brian Smith
Moderator: Mark Bouchard
* April 30, 2008
LBCAV webcast
Speaker: Sponsored by SecureComputing
CLICK HERE FOR A RECORDING OF THIS EVENT
* Mar 26, 2008
WHW Monthly Update – Late-Breaguide Computer Attack Vectors
Sponsor:Mu Security
CLICK HERE FOR A RECORDING OF THIS EVENT
Speaker: Adam Stein
* March 19, 2008
Log Management Thought Leadership Roundtable Webcast Part II:
Sponsors: AlertLogic and TriGeo
CLICK HERE FOR A RECORDING OF THIS EVENT
Moderator: Mark Bouchard
Panelists: AlertLogic’s Misha Govshteyn , TriGeo’s Michael Maloof and Dorian Software’s Robert A. Milford
Panelists: LogLogic’s Dr. Anton Chuvakin, LogRhythm’s Chris Petersen, ArcSight’s Hugh Njemanze and Ripple Tech’s Mehlam Shakir.
* March 5, 2008
Log Management Thought Leadership Roundtable:
Sponsors: LogLogic, ArcSight and RippleTech;
CLICK HERE FOR A RECORDING OF THIS EVENT
Panelists: LogLogic’s Dr. Anton Chuvakin, LogRhythm’s Chris Petersen, ArcSight’s Hugh Njemanze and Ripple Tech’s Mehlam Shakir.
* February 27, 2008
WHW Monthly Update – Late-Breaguide Computer Attack Vectors
Sponsored by TriGeo
Event Details
* January 17, 2008
Mike Rothman’s Top 5 IT Security Tips for 2008
Sponsored by Core Technologies
CLICK HERE FOR A RECORDING OF THIS EVENT
Event Details

Hidden Content

http://www.kachmar.com/archives.html

PassGuide Cisco Exams Questions & Training Materials

  1. Free Wardriving & Wireless Penetration Testing
  2. Free MCSE Core Elective Exams in a Nutshell (In a Nutshell (O’Reilly))
  3. Free ISAAF-PENETRATION TESTING FRAMEWORK
  4. Free trainsignal Microsoft Office 2007 Training Videos
  5. Free Wireshark University DVD WSU04 – Wireshark Network Forensics and Security
  6. Free Giveaway: Security+ Voucher
  7. Free free Offensive Security 101 V2.0
  8. Free Prove You Know Security with the CompTIA Security Trustmark
  9. Free offer* Testout Security+, security plus
  10. Free Microsoft Windows Server 2008: A Beginner’s Guide (Paperback), (Network Professionals
  11. Free HP ExpertONE Certification Testing at HP DISCOVER 2011
  12. Free [Offer]Offensive Security Wireless Attacks – Backtrack WiFu

About the Author

PassGuide Free Certification Exam Download has written 6442 stories on this site.

If you have any doubts about legality of content or you have another suspicions, feel free to contact us:CertGuard@Gmail.com

Write a Comment

Gravatars are small images that can show your personality. You can get your gravatar for free today!

You must be logged in to post a comment.

Copyright © 2017 CertBible – IT certifications Exams,Study Guide,Practice Test,Training Materials.. PassGuide,Testinside,Pass4side,Certifyme,Transcender,Examworx,Topcerts,Actualtests. microsoft Comptia MCSE Oracle hp ibm citrix Sitemap