Icon1 Icon2 Icon3 Icon4
See other templatesSee other templates

Events

All cyber-security events will currently be online due to the COVID-19 pandemic. Check out our list of events and update your calendar.

Read more...

Speakers

Our professional speakers help gain insight to some of the most important issues in cyber-security. Book one of our speakers today or attend an event happening online.

Read more...

Movies

Check out our list of recommended movies that deal with hacking, cyber-security, and technology.

Read more...

Books

Check out our list of recommended books that deal with hacking, cyber-security, and technology.

Read more...

Security Specialist

Security Specialist

A major corporation or organization uses a security specialist to protect their software and network security system.

Security Administrator

Security Administrator

A security administrator is the someone who understands the entire system and keeps it functioning securely and optimally.

Vulnerability Assessor

Vulnerability Assessor

Vulnerability Assessors may also be referred to as Vulnerability Assessment Analysts.

Defcon OC Phone

Cryptographer

Cryptographer

Ciphers, algorithms and security systems are put into code by a Cryptographer. They also encipher and decipher code.

Chief Information Security Officer

Chief Information Security Officer

A Chief Information Security Officer (CISO) is a security professional who has reached the pinnacle of the profession and administrates procedure.

Forensic Expert

Forensic Expert

Computer forensics experts are increasingly in demand by corporate and governmental bodies alike.

Go to top