Detect Early and Detect Often: The Case for Threat Monitoring
Date: Friday, June 14th at 9 a.m. PT / 12 noon E.T.
Addressing 24/7 threats with 24/7 vigilance
In an era when cyber threats evolve at an unprecedented rate, proactive threat monitoring has never been more critical. This webinar will equip IT professionals, IT managers, and business professionals with knowledge and strategies to enhance their organizations' cybersecurity posture. Led by two leading cybersecurity experts with extensive field experience, we’ll dive into the importance of continuous threat monitoring and its role in preempting cyber incidents. Attendees will gain a deep understanding of the latest tools and technologies that facilitate real-time threat detection and how these can be integrated effectively into their existing security frameworks.
Here is the AGENDA for the summit:
9 a.m. PT / 12 noon ET
Detect Early and Detect Often: The Case for Threat Monitoring
10 a.m. PT / 1 p.m. ET
Top Threat Monitoring Implementation Strategies
11 a.m. PT / 2 p.m. ET
Threat Monitoring Toolkit: Best Third-Party Solutions
About the presenters:
Dave Kawula, Managing Principal Consultant, TriCon Elite Consulting
Dave Kawula is a highly accomplished technology professional and Microsoft Most Valuable Professional (MVP) specializing in Microsoft Azure, hybrid cloud solutions, and cybersecurity. With over 20 years of experience in the IT industry, Dave has established himself as a trusted advisor to organizations of all sizes, helping them navigate the complex world of Microsoft technologies and optimizing their IT infrastructure.
John O'Neill Sr., Chief Technologist, AWS Solutions
John’s professional IT career began as a teenager, taking him on many wonderful adventures over the past 30 years. John’s IT path started with programming but branched out quickly. Opportunities from the Help Desk to the Corner Office shape his IT journey. Specializing in Security, System, and Infrastructure technologies, John’s broad skillset includes Desktop and Server OS, Identity Management, Networking Services, Network Architecture, IP Telephony, and CyberSecurity.
Register now!
Duration: 1 hour