Detect Early and Detect Often: The Case for Threat Monitoring

Date: Friday, June 14th at 9 a.m. PT / 12 noon E.T.

Addressing 24/7 threats with 24/7 vigilance

In an era when cyber threats evolve at an unprecedented rate, proactive threat monitoring has never been more critical. This webinar will equip IT professionals, IT managers, and business professionals with knowledge and strategies to enhance their organizations' cybersecurity posture. Led by two leading cybersecurity experts with extensive field experience, we’ll dive into the importance of continuous threat monitoring and its role in preempting cyber incidents. Attendees will gain a deep understanding of the latest tools and technologies that facilitate real-time threat detection and how these can be integrated effectively into their existing security frameworks.

Here is the AGENDA for the summit:

9 a.m. PT / 12 noon ET
Detect Early and Detect Often: The Case for Threat Monitoring

10 a.m. PT / 1 p.m. ET
Top Threat Monitoring Implementation Strategies

11 a.m. PT / 2 p.m. ET
Threat Monitoring Toolkit: Best Third-Party Solutions

About the presenters:

Dave Kawula, Managing Principal Consultant, TriCon Elite Consulting

Dave Kawula is a highly accomplished technology professional and Microsoft Most Valuable Professional (MVP) specializing in Microsoft Azure, hybrid cloud solutions, and cybersecurity. With over 20 years of experience in the IT industry, Dave has established himself as a trusted advisor to organizations of all sizes, helping them navigate the complex world of Microsoft technologies and optimizing their IT infrastructure.

John O'Neill Sr., Chief Technologist, AWS Solutions

John’s professional IT career began as a teenager, taking him on many wonderful adventures over the past 30 years. John’s IT path started with programming but branched out quickly. Opportunities from the Help Desk to the Corner Office shape his IT journey. Specializing in Security, System, and Infrastructure technologies, John’s broad skillset includes Desktop and Server OS, Identity Management, Networking Services, Network Architecture, IP Telephony, and CyberSecurity.

Register now!


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.