Cybersecurity

More information will be added soon.  Please refer to the Tech Collective Events page for our current offering of technical trainings and educational events. 

Loading Events

Upcoming Events › Cybersecurity

Events Search and Views Navigation

Event Views Navigation

August 2020

Open Source Security Tool Training

August 17 @ 6:00 pm - 7:30 pm EDT

WiFi Security Testing Jesse Roberts of Compass IT Compliance will come back to talk about hacking WiFi access points. Whether it's WPA2 passwords or Enterprise, there's various things to think about and weaknesses to consider. Jesse will show how we can test these devices and tighten up the security.Some Important additional Details:Our Open Source Security Tool Series –WiFi Security Testing is taking place on Microsoft Teams . If you have never logged into a Microsoft Teams before, be sure to…

Find out more »

Shaping Security Transformation in Challenging Times

August 18 @ 1:00 pm - 2:00 pm EDT

Due to the sheer volume of the task, staying current on all those security dependencies is nearly impossible to do alone. Improving vulnerability management and remediation processes is a task that requires cybersecurity pros to actively keep up with the latest developments in the threat landscape, business environments, intelligence, services, and technology solutions. Due to the sheer volume of the task, staying current on all those security dependencies is nearly impossible to do alone. Join Steven Booth, FireEye Chief Security…

Find out more »

September 2020

CIS Top20: A prioritized set of actions to protect your organization

September 8 @ 10:10 am - 10:40 am EDT

This presentation will provide an overview of the Basic, Foundational and Organizational CIS 20 Controls. We will discuss the control categories, there significance to your organization and provide examples of what can occur if these controls are not put in place.What participants can expect to gain: An introductory overview of the CIS 20 Controls framework.Who should attend? IT Management & Executive Level ManagementAbout the presenter:Bruce Cheney: Bruce’s certification list reads like a scroll. His 20+ years of IT Experience and…

Find out more »

Strengthening Your Frontline of Defense Against Cyber Attacks

September 15 @ 10:10 am - 10:50 am EDT

Strengthening Your Frontline of Defense Against Cyber Attacks: Microsoft Advanced Threat Protection and KnowBe4 OverviewAs businesses come to rely more on technology, how do you protect yourself from cybercriminals? Join Kathleen Malin , VP of Technology and Operations Management of the RI Foundation, and Tricia King, Senior Consultant at Vertikal6, to learn about two tools that can be used to keep your business safe.Tricia will be covering Microsoft Advanced Threat Protection which provides protection across the Microsoft 365 environment. It…

Find out more »

Tech Collective Ethical Hacker

September 15 @ 3:30 pm - November 17 @ 7:30 pm EDT
Tech Collective, 188 Valley Street, Providence, RI 02909
Providence, RI 02909 US
+ Google Map

Tech Collective’s Ethical Hacker Certification is a 40 hour virtual, hands-on program Tech Collective’s Ethical Hacker is a 40 hour virtual, hands-on program that will prepare you for the EC Council Exam. This bootcamp covers how to work with a variety of systems to find out where their weaknesses or vulnerabilities may be, and how you can identify and reinforce these gaps to prevent successful hacking attempts. Ethical hacking is where an IT professional uses the same hacking techniques as…

Find out more »

Cyber Agility & Resiliency

September 22 @ 10:10 am - 10:40 am EDT

Approaching security programmatically enables organizations to be resilient and agile in enabling business continuity. Cybersecurity requirements are constantly evolving. Building capabilities, justifying investment dollars, designing and validating solutions gets easier to facilitate when you create a Security information management system; a programmatic approach. Have you embarked on your journey yet?What participants can expect to gain: Insight into building a strategic approach to operationalizing security policies, why follow a framework? How to establish security policies? Why document your capabilities? Who should…

Find out more »
+ Export Events