Support • (786) 621-8600 Contact us
Demo

Recent Posts

2017 SFISSA “Hack the Flag” & Chili CookOff

{{date_event:2017-08-19}} DigitalEra is proud to sponsor the 2017 SFISSA Hack The Flag and Chili Cookoff. This year’s event will take place at the Graham Center Ballroom on the campus of FIU in Miami on Saturday August 19th.

Capture the Flag

There will be two different capture the flag games and levels:

  • Advanced CTF – Are you a CTF pro? The advanced CTF game will present all new challenges. Join the K&K CTF hosted by %27 of Hack Miami. Learn more about K&K at kandkctf.com.
  • Beginner CTF – Never played a CTF before? The beginner game will be perfect for you. There will be people to help and guide you… a great way to learn how to Capture the Flag.

CTF Participants will need to bring a Laptop, Ethernet Cable, USB Ethernet Adapter if necessary.

Lock Pick & Chili Cookoff

  • Also at this event: A fun lock pick village (no equipment or skill necessary) and of course our famous chili cook-off.
  • Chili aficionados: Make sure to bring your best chili to compete for the best chili honors.

Plenty of brew: Sample new craft beers as well as some of your local  favorites. For more details, visit the offical registration page at: https://www.eventbrite.com/e/2017-sfissa-hack-the-flag-and-chili-cookoff-tickets-32623740486

DEF CON 25: July 27th – 31st, Las Vegas, NV

{{date_event:2017-07-27}} DEF CON is one of the world’s largest annual hacker conventions, held annually in Las Vegas, Nevada.

Last year over 20,000 people attended.  Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, phone phreaking, hardware modification, and anything else that can be “hacked.”

Federal law enforcement agents from the FBI, DoD, United States Postal Inspection Service, and other agencies regularly attend DEF CON. The event includes several tracks of speakers on as well as social events, Wargames and hacking contests.

Cost to attend: $260 USD for all four days, cash only at the door. There is no pre-registration.

For details visit: https://www.defcon.org/html/defcon-25/dc-25-index.html

     

2017 Gartner Security & Risk Management Summit

{{date_event:2017-06-12}} The Gartner Security & Risk Management Summit was designed for individuals in the following roles: CIOs, CSOs, CISOs, CROs, CPOs and their teams, Business continuity and IT disaster recovery managers, Governance, risk and compliance consultants, Network security manager, security executives and directors.  This year’s key notes are John Brennan, Director CIA and leading inspirational speaker Lewis Pugh. Tracks include: Educational Leaders Virtual Track, Financial Services Professionals Virtual Track, Government Virtual Track, Healthcare Professionals Virtual Track and a Midsize Enterprise Peer Exchange Forum. For registration information click here.

June 8th Webinar: You Don’t Have to Be a Packet Ninja to Know Who’s Talking in Your Network

{{date_event:2017-06-08}}  When attackers compromise the perimeter, or are operating from within, you need to know. You can only stop attackers from gaining a foothold in your network to expand their presence if you can see them The indicators of a breach are often first observed within the network itself, therefore network monitoring and forensics plays an essential role in helping to detect, respond, and naturalize attacks.

In this June 8th webinar sponsored by DigitalEra, LogRhythmn’s Emily Henriksen will discuss how to quickly identify emerging threats in your IT environment using network monitoring and forensic tools.

Join this webinar to learn:

* How to quickly identify emerging threats in your IT environment using network monitoring and forensic tools

* What Network Monitor is and the important role it plays in your security operations strategy

* Real-life use cases that highlight the power of Network Monitor

* How Network Monitor works with SIEM to reduce the mean-time-to-detect (MTTD) and mean-time-to-respond (MTTR) to cyber attacks

Register now to learn how monitoring your network can help you detect and investigate potential malicious behavior within your IT environment

Click here to Register:

         

May 25th Webinar: Reducing the Time to Detect Ransomware in Your Network

{{date_event:2017-05-25}} You’re invited to join us for the first in a series of webinars sponsored by DigitalEra and presented by LogRhythmn “Reducing the Time To Detect Ransomware in your Network”.

Over the past three years, ransomware has jumped into the spotlight of the cyberthreat landscape. Until recently, most ransomware attacks were simply opportunistic and mostly affected individual users’ or small businesses’ computers. The ransom demands have commonly been the equivalent of just a few hundred dollars for an individual PC.

In this webinar, LogRhythmn’s Manija Poulatova discusses how to leverage SIEM technology to catch and respond to ransomware to prevent it from spreading and reaching the critical mass.

The Webinar is slated for 12:00 Noon ET.

To register click here now.