June 2 - June 4, 2020
Global STAC Live - Spring 2020
STAC is going global, online, and live! Join us for panel discussions, live Q&A, presentations, and exhibits on the latest financial technology. With built-in video, audio, and text chat, you can interact directly with speakers, see product demos, visit with leading vendors in their exhibit booths, and network with your peers--all without leaving your home or office.
June 2, 2020
Nozomi + Keysight: Securing ICS – Can industrial devices take your network down?
With the Internet of Things (IoT) bringing industrial devices online, cyber defenses must extend to new locations and technologies for the first time. Join Nozomi and Ixia to learn whether the industrial Internet of Things – or IIoT—is placing your operational technology (OT), company data, or brand at risk.

Experts will show you how to gain real-time visibility across Industrial Control System (ICS) environments to detect complex threats that appear suddenly or develop over time. Learn to quickly improve security at power substations, oil and gas facilities, discrete manufacturing sites and other remote locations.

Register for this webinar to learn how to:

•gain visibility of industrial devices for the first time
•accelerate response time across ICS environments
•improve operational technology (OT) uptime and efficiency
June 4, 2020
Data Connectors Virtual Summit - Seattle/Portland
Data Connectors has invested in a fully immersive virtual event platform, which provides every facet of our in-person conferences that can be facilitated online:

Real-time speaking sessions, live keynotes and presenter Q&A Panels
Moderated CISO Panel
Solutions Showcase with interactive Virtual Exhibit Booths
Our virtual events have seen audiences two to three times larger than the commensurate in-person conferences, with great audience interaction, and more vendor partner solution provider and peer-to-peer networking than ever before.
June 11, 2020
FCW Virtual Roundtable: How Network Visibility Can Improve Agency Cybersecurity
It is critical for federal agencies, especially organizations tasked with national defense, to adapt to an ever-changing threat landscape with respect to cyber security. The needs of disparate groups within the government can be vastly diverse and require a thoughtful and customized approach to ensure both network fidelity and function. Whether the protected network resources are on-premises, in the cloud, or utilizing a hybrid network, combating emerging threats requires leveraging best of breed security solutions, techniques, and threat intelligence from the private sector to ensure the strongest possible security posture.

During this webcast, you will learn more about:

Tactics and strategies employed by cyber attackers
Managing and securing defense networks
How new tools and architecture can help
And bring your questions for our Q&A!
June 11, 2020
Tech Talk: IoT Coexistence Challenge
With so many IoT devices flooding the market these days, ensuring they can coexist peaceably has become quite a challenge. The interference devices experience can result in everything from faulty or unintended functionality to complete operational failure. For some it’s a mere nuisance. In the case of medical IoT devices it can be a matter of life or death.

Join us for Keysight’s latest IoT Tech Talk as we discuss the importance of IoT device coexistence and coexistence testing. This 15-minute webinar is your chance to hear Keysight’s Deborah Homan and Brad Jolly discuss how you can ensure your IoT devices operate as expected in their intended environment.

•Do you want to know how you can determine your device’s tolerance to other radio signals?
•Want tips on how you can design your coexistence test or how to perform it accurately and efficiently?
•Need to get up to speed quickly on what design and test solutions you should and shouldn’t use?

Don’t miss Deb and Brad’s next IoT Tech Talk as they discuss this topic and answer your questions live. If you cannot attend the live broadcast please register and we will send you the recording.
June 16 - June 18, 2020
FutureCon Virtual Event - West
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations. “Cybersecurity is no longer just an IT problem" Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world's security leaders and gain other pressing topics of interest to the information security community. Download the FutureCon event App to be part of the ongoing FutureCon community giving you the resources to stay one step ahead of Cyber challenges. The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world's security leaders.
June 18, 2020
Monitoring the Edgeless Enterprise: Safeguarding Security + User Experience
IOT and edge computing offer connectivity and convenience — but not without increased risk. Without access to critical packet data at the edge of your network, you face significant challenges in securing your network and maintaining quality-of service. In this webinar, you’ll discover the tools you need to monitor and secure your network — from core to edge.
June 23, 2020
Viavi + Keysight: Stack Cybersecurity Odds in your Favor with More & Better Data
According to Cybersecurity Ventures, global spending on cybersecurity products and services will exceed $1 trillion from 2017 to 2021 – yet breaches still make headlines. Join VIAVI and Keysight to stack the odds in your favor by mounting a faster response using better data from your network and clouds. 

Learn to collect and use enhanced data flows, logs and packets in tandem – quickly and efficiently – to spot threats, block attacks, and bridge the gap between network and security operations (NetOps and SecOps). 

Register for this webinar to learn: 

-Best practices to speed incident response 
-How to collect and streamline packet, log, and flow data to improve security 
-How to share and optimize data across NetOps and SecOps 

If you cannot attend the live broadcast, please register and we will send you a link to the recording when it is available. 
June 23, 2020
Securing the Remote Workforce: Optimizing SecOps for WFH Users
The new normal is here. A surge in work-from-home (WFH) users has brought some unique challenges for both SecOps and NetOps teams. These questions come to mind, typically as your head hits the pillow each night: Can my VPN handle the new traffic? Does my next-generation firewall (NGFW) protect against nefarious lateral movement from employees on personal devices at home? Our board members keep asking me to “prove it” when I say we’re protected, but what can I actually send them?

In this webinar, you’ll learn from some of Keysight’s best security minds about how to answer these critical questions, optimize and secure your remote workforce, and send your boss proof that you’re not just watching Netflix all day.

Register for this webinar to learn how to:
. Prove that you’re more secure today than you were yesterday.
. Optimize network security for an influx in WFH traffic.
. Proactively assess your network security by simulating the latest attacks, identifying misconfigurations, and fixing vulnerabilities.
Please find out more Network Visibility Webinars -

July 2, 2020
Critical Thinking for Network Security Testing
This webinar is an in-depth approach to pragmatic testing of the security and robustness of content aware networked solutions.

Join us to learn how to:
•Understand the types of equipment and functionality that needs to be tested within your network
•Learn the benefits of pre-production testing of security equipment
•Understand how to properly test your security architecture

If you cannot attend the live event please register and we will send you the on-demand link when it becomes available.