Views Navigation

Event Views Navigation

Today
  • Rocky Mountain Cyberspace Symposium 2020

    The Broadmoor Hotel 1 Lake Ave, Colorado Springs, CO, United States

      Booth 98 Our Symposium provides a national forum for industry and government to work together to help solve the challenges of cybersecurity, community cyber readiness and national defense.  Our theme this year is: “The Future of Cyber – Cyber 2030." Industry, DoD and Academic experts will discuss the evolution, and our increasing dependency, on […]

  • HPA Tech Retreat 2020

    The Westin Mission Hills 71333 Dinah Shore Dr, Rancho Mirage, CA, United States

    Innovation Zone

  • How CyberConvergence Eliminates Ransomware, Stops Breaches, and Meets Compliance

    Microsoft Corporation 5 Wayside Drive, Burlington, MA, United States

    How CyberConvergence Eliminates Ransomware, Stops Breaches and Meets Compliance Details RackTop Systems, the pioneer of CyberConverged™ data security, will present how "CyberConvergence", the embedding of security into a complete data security solution vs. bolting it on, creates a more secure, cost effective, and easier to manage solution. Meeting schedule: 6:00 - 7:00PM Networking, introductions, pizza, […]

  • Webinar: Improve Security, Drive Operational Efficiencies and Maintain Continuous Compliance

    Business demands on IT organizations continue to escalate while IT resources and budgets are under constant scrutiny. Sophisticated security attacks and complex regulatory compliance requirements make it nearly impossible to meet those demands. BrickStor Security Platform by RackTop empowers IT organizations to address each of these challenges in a low-cost manageable solution. In this webinar, […]

  • DoD SAP IT & Cybersecurity 2020 Summit

    Breakout Session: Zero Trust - Protecting Data at the Source presented by CTO Jonathan Halstuch Thursday, September 3rd 11 - 12pm EST A concerted effort must be made to protect critical sensitive data and not just the network. The data is what an adversary is trying to steal and manipulate. A zero trust approach to data […]