Filling Calendars since 2019

Join a Tech Event Today!

Phone: +1 (800) 991 - 4113

Upcoming Events

OxResponse Challenge

Data Security

Test and guide your team through a series of cyberattack scenarios

Click to Find out More!
January 18, 2022

The What, Why, and How of Kubernetes Data Storage

Data Storage

Learn about Kubernetes-native data storage, its benefits and the characteristics that differentiate it from traditional storage systems

Click to Find out More!
November 1, 2021

Inside the Mind of a Hacker

Data Security

A look into the scope of current cyber attacks, and a discussion around how to best protect yourself

Click to Find out More!
October 27, 2021

Operation Red Escape

Data Security

See first-hand how adversaries carry-out common cyberattacks on organizations

Click to Find out More!
October 22, 2021

Tech Data Cyber Range

Data Security

Be in control of a multi-cloud organization that is on the verge of experiencing a significant cyberattack

Click to Find out More!
October 13, 2021

IBM Virtual Cyber Response Experience

Data Security

Be in control of a multi-cloud organization that is on the verge of experiencing a significant cyberattack

Click to Find out More!
September 21, 2021

Red Hat Ansible Security Automation Workshop

Development

Learn how to use Ansible to orchestrate 3 security investigation and response activities involving multiple security tools.

Click to Find out More!
June 19, 2021

The What, Why, and How of Kubernetes Data Storage

Data Storage

Learn about Kubernetes-native data storage, its benefits and the characteristics that differentiate it from traditional storage systems

Click to Find out More!
November 1, 2021

Tech Data Cyber Range

Data Security

Be in control of a multi-cloud organization that is on the verge of experiencing a significant cyberattack

Click to Find out More!
October 13, 2021

OxResponse Challenge

Data Security

Test and guide your team through a series of cyberattack scenarios

Click to Find out More!
January 18, 2022

Inside the Mind of a Hacker

Data Security

A look into the scope of current cyber attacks, and a discussion around how to best protect yourself

Click to Find out More!
October 27, 2021

Operation Red Escape

Data Security

See first-hand how adversaries carry-out common cyberattacks on organizations

Click to Find out More!
October 22, 2021

Tech Data Cyber Range

Data Security

Be in control of a multi-cloud organization that is on the verge of experiencing a significant cyberattack

Click to Find out More!
October 13, 2021

IBM Virtual Cyber Response Experience

Data Security

Be in control of a multi-cloud organization that is on the verge of experiencing a significant cyberattack

Click to Find out More!
September 21, 2021

The What, Why, and How of Kubernetes Data Storage

Data Storage

Learn about Kubernetes-native data storage, its benefits and the characteristics that differentiate it from traditional storage systems

Click to Find out More!
November 1, 2021

Red Hat Ansible Security Automation Workshop

Development

Learn how to use Ansible to orchestrate 3 security investigation and response activities involving multiple security tools.

Click to Find out More!
June 19, 2021

May 12th

Red Hat Ansible Security Automation Workshop

Learn how to use Ansible to orchestrate 3 security investigation and response activities involving multiple security tools.

Click to Find out More!

5/13 - The What, Why, and How of Kubernetes Data Storage

May 13th

The What, Why, and How of Kubernetes Data Storage

Learn about Kubernetes-native data storage, its benefits and the characteristics that differentiate it from traditional storage systems

Click to Find out More!

5/13 - The What, Why, and How of Kubernetes Data Storage

May 19th

Tech Data Cyber Range

Be in control of a multi-cloud organization that is on the verge of experiencing a significant cyberattack

Click to Find out More!

5/19 - Tech Data Cyber Range

May 19th

Red Hat Ansible Security Automation Workshop

Learn how to use Ansible to orchestrate 3 security investigation and response activities involving multiple security tools.

Click to Find out More!

5/19 - Red Hat Workshop

June 10th

Inside the Mind of a Hacker

A look into the scope of current cyber attacks, and a discussion around how to best protect yourself

Click to Find out More!

6/10 - Inside the Mind of a Hacker

June 15th

Operation Red Escape

See first-hand how adversaries carry-out common cyberattacks on organizations

Click to Find out More!

6/15- Operation Red Escape

April 20th

IBM Virtual Cyber Response Experience

Be in control of a multi-cloud organization that is on the verge of experiencing a significant cyberattack

Click to Find out More!

TBD - IBM Cyber Response

TBD

OxResponse Challenge

Test and guide your team through a series of cyberattack scenarios

Click to Find out More!

TBD - OxResponse Challenge

TBD

Cyber Wargame

Test your organization’s incident response process, communication and problem solving skills

Click to Find out More!

TBD - Cyber Wargame

Recent Events

April 13th

Inside the Mind of a Hacker

A look into the scope of current cyber attacks, and a discussion around how to best protect yourself

Click to Find out More!

4/13 - Inside the Mind of a Hacker

April 20th

IBM Virtual Cyber Response Experience

Be in control of a multi-cloud organization that is on the verge of experiencing a significant cyberattack

Click to Find out More!

4/20 - IBM Cyber Response

May 5th

Red Hat Ansible Security Automation Workshop

Learn how to use Ansible to orchestrate 3 security investigation and response activities involving multiple security tools.

Click to Find out More!

5/5 - Red Hat Workshop

Give us A Shout

Thank you! Your submission has been received!

Oops! Something went wrong while submitting the form :(