Come Meet Coach Mel Reyes at Cybersecurity Defense Ecosystem Summit in El Segundo on...
Do not miss Mel Rico Reyes at the upcoming Cybersecurity Defense Ecosystem Summit in El Segundo, CA, as he will be presenting on three...
Come Meet Redstor at IOTSSA Cybersecurity Event on Oct. 26th-27th
So you've been hacked; what now? Matt Scully of Redstor will answer this question at the upcoming IOTSSA cybersecurity event on October 26-27 in...
Come Meet Panorays at IOTSSA Cybersecurity Event on March 30th
Joseph Jaghab will talk about how to automate, accelerate & scale your third-party security risk management. Find out more on March 30th at the...
Maintaining Data Security Throughout – Cigent
Today, you need to protect your most valuable asset - your data - against the most sophisticated adversaries. Julian discusses with Tom Ricoy, CRO...
Come Meet Cisco at IOTSSA Cybersecurity Event on Oct. 26th-27th
Most everyone knows Cisco and what they do, but did you know that they are the 3rd largest cybersecurity company on the planet? Only...
Come Meet Juan Fernandez at IOTSSA Cybersecurity Event on February 16-17th
Join Juan Fernandez as he will be hosting a Masterclass on how to build an MSSP business and how to scale and do it...
ThinkLabs: Will our Energy Grid Withstand Growing Demands?
ThinkLabs AI, a new startup in Canada and the US, focused on developing technology to help enhance grid planning through a combination of intelligent...
Get out of your Bunker and Join us in Edison, NJ for the IOTSSA...
25 Year MSP, Randal Wark joins us to talk about his successes and challenges building an IT Services Practice. He will also talk...
Cybersecurity Defense Ecosystem Podcast Episode 4: Partner Elevate
Presenter: Des Russell, Chief Partnership Officer at Partner Elevate
Julian and Des talk about how Partner Elevate's solution can help vendors solve the problems that...
Best Practices for Protecting Mobile Devices
JT Keating, SVP Strategic Initiatives of Zimperium, provided insights into the attack vectors on mobile devices, including malicious apps, network exploits, and phishing, and...















