Archives: Events

Loading Events

Past Events

Events Search and Views Navigation

Event Views Navigation

February 2020

HPA Tech Retreat 2020

February 17, 2020 - February 20, 2020
The Westin Mission Hills, 71333 Dinah Shore Dr
Rancho Mirage, CA 92270 United States

Innovation Zone

Find out more »

March 2020

How CyberConvergence Eliminates Ransomware, Stops Breaches, and Meets Compliance

March 12, 2020 @ 6:00 pm - 8:00 pm
Microsoft Corporation, 5 Wayside Drive
Burlington, MA 01803 United States

How CyberConvergence Eliminates Ransomware, Stops Breaches and Meets Compliance Details RackTop Systems, the pioneer of CyberConverged™ data security, will present how "CyberConvergence", the embedding of security into a complete data security solution vs. bolting it on, creates a more secure, cost effective, and easier to manage solution. Meeting schedule: 6:00 - 7:00PM Networking, introductions, pizza, salad and refreshments 7:00 - 7:45PM How CyberConvergence Eliminates Ransomware, Stop Breaches & Meet Compliance. 8:00PM - Raffles. Meeting concludes Today’s enterprise environment is facing…

Find out more »

Webinar: Improve Security, Drive Operational Efficiencies and Maintain Continuous Compliance

March 27, 2020 @ 2:30 pm - 3:30 pm

Business demands on IT organizations continue to escalate while IT resources and budgets are under constant scrutiny. Sophisticated security attacks and complex regulatory compliance requirements make it nearly impossible to meet those demands. BrickStor Security Platform by RackTop empowers IT organizations to address each of these challenges in a low-cost manageable solution. In this webinar, we will demonstrate how BrickStor: Delivers zero trust security protections to protect against ransomware and insider threats Maintains continuous compliance with real-time user behavior analytics…

Find out more »

August 2020

DoD SAP IT & Cybersecurity 2020 Summit

August 30, 2020 - September 3, 2020

Breakout Session: Zero Trust - Protecting Data at the Source presented by CTO Jonathan Halstuch Thursday, September 3rd 11 - 12pm EST A concerted effort must be made to protect critical sensitive data and not just the network. The data is what an adversary is trying to steal and manipulate. A zero trust approach to data security doesn’t rely on a trusted core like traditional approaches. Instead, zero trust strives to improve data security and reduce complexity. This approach can be…

Find out more »

October 2020

Insider threats

October 15, 2020 @ 1:00 pm - 2:00 pm

Learn how insider threats operate from a former NSA engineer. Gain the knowledge you need to develop an efficient insider threat program. Find out how to better detect and identify unusual and unauthorized behavior so you can intervene before your team’s intellectual property has been compromised. Most importantly, you will develop an understanding of how you can implement a Zero Trust architecture designed to withstand any attack – inside or otherwise. Bolster existing programs and capabilities Review how to simplify…

Find out more »
+ Export Events