TrustedSec(@TrustedSec) 's Twitter Profileg
TrustedSec

@TrustedSec

End-to-end Cybersecurity consulting team leading the industry, supporting organizations, and giving back. #Hacktheplanet
Blogs, news, webinars, and tools!

ID:403811306

linkhttps://www.trustedsec.com calendar_today03-11-2011 01:20:37

4,0K Tweets

74,2K Followers

792 Following

TrustedSec(@TrustedSec) 's Twitter Profile Photo

Have you answered a call, only to hear ”Can you hear me?”. Advisory Solutions Director Alex Hamerstone spoke with WWL First News with Tommy Tucker to explain why answering that question may make you the victim of a scam. Watch Now! hubs.la/Q02w3hMv0

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

Security Consultant whitney🧜🏽‍♀️ will be speaking at BSides312 on May 11 in Chicago. Her talk on Mobile Application Penetration Testing will take place at 12:30pm. Check it out if you'll be there! hubs.la/Q02vNdg10

Security Consultant @_whit_ney_m will be speaking at @bsides312 on May 11 in Chicago. Her talk on Mobile Application Penetration Testing will take place at 12:30pm. Check it out if you'll be there! hubs.la/Q02vNdg10
account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

We are excited to sponsor this year's ShowMeCon in St. Louis on May 13-14. Make sure you visit our booth if you'll be there! hubs.la/Q02vJbkw0

We are excited to sponsor this year's @ShowMeConSTL in St. Louis on May 13-14. Make sure you visit our booth if you'll be there! hubs.la/Q02vJbkw0
account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

Founder and CEO Dave Kennedy talks about what it means for TrustedSec to be named a Leader in the The Forrester Wave™ Cybersecurity Consulting Services, Q2 2024. Watch the full video on YouTube! hubs.la/Q02vMBqW0
Download the full report here: hubs.la/Q02vMwqx0

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

As a CISO, how can you make sure your organization has implemented the correct controls and systems if your customer data is compromised?Darkoperator | 🇺🇦 outlines some steps your org can take to be more proactive with your data management. Read it now! hubs.la/Q02vS6J10

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

We had a great time hosting students from the Polaris High School today at the HQ! A few of our consultants spoke about in and how to break into the field.

We had a great time hosting students from the @PolarisCareerHS today at the HQ! A few of our consultants spoke about #careers in #cybersecurity and how to break into the field.
account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

NIST CSF 2.0 is refining and expanding with the framework's first major update since its creation 10 years ago. Join us for our next webinar to learn:
👀What has changed
✌️How to apply 2.0 to your org
🧙‍♂️How to align maturity scores
Register now!
hubs.la/Q02vBpGy0

NIST CSF 2.0 is refining and expanding with the framework's first major update since its creation 10 years ago. Join us for our next webinar to learn: 👀What has changed ✌️How to apply 2.0 to your org 🧙‍♂️How to align maturity scores Register now! hubs.la/Q02vBpGy0
account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

For almost a year, invisible password spraying could be performed against any tenant due to a vulnerability in . In our latest blog, nyxgeek walks us through how these attacks could have been carried out. Read it now! hubs.la/Q02vpTlN0

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

Director of Software Security Scott White will be a keynote speaker at the 2024 API Pipeline Conference and Expo in Salt Lake City, Utah on May 7. His talk 'It's WHEN...not IF' will take place at 1:30pm. API Global Industry Services hubs.la/Q02v9p9H0

Director of Software Security Scott White will be a keynote speaker at the 2024 API Pipeline Conference and Expo in Salt Lake City, Utah on May 7. His talk 'It's WHEN...not IF' will take place at 1:30pm. #Pipeline24 @APIGlobal hubs.la/Q02v9p9H0
account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

On this episode of , we continue our series with special guests Dave Kennedy and teacher Darren Pocek. We sit down to chat about the ins and outs of the recently launched cybersecurity education program Bedford High School, Ohio. Listen now! hubs.la/Q02v8vPn0

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

The new episode of Security Noise is coming your way tomorrow! This week, we continue our InfoSec career discussion with Dave Kennedy. We discuss the details of the recently launched cybersecurity education program at Bedford High School. Listen wherever you get your podcasts!

The new episode of Security Noise is coming your way tomorrow! This week, we continue our InfoSec career discussion with @HackingDave. We discuss the details of the recently launched cybersecurity education program at Bedford High School. Listen wherever you get your podcasts!
account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

In our latest blog, Principal Research Analyst Scott Nusbaum continues his series and breaks down a technique for loading DLL’s into memory. Read it now! hubs.la/Q02v1mm30

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

Will banning TikTok improve data security for Americans? Advisory Solutions Director alex hamerstone spoke with Fox 26 Houston about the security concerns surrounding this app and the bill passed recently in congress that could ban in the U.S. Watch now!

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

Registration is now open for our next 'Preparing for NIST CSF 2.0: Practical Tips for Implementation' on May 8. Join @jaredmcwherter and alex hamerstone as they provide advice for aligning your practices with 's latest iteration. Register now!
hubs.la/Q02tWzwN0

Registration is now open for our next #webinar 'Preparing for NIST CSF 2.0: Practical Tips for Implementation' on May 8. Join @jaredmcwherter and @infosecdoc as they provide advice for aligning your practices with #NIST's latest iteration. Register now! hubs.la/Q02tWzwN0
account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

We are excited to sponsor the ILTA EVOLVE conference next week in Charlotte, NC! EVOLVE addresses the legal tech community’s latest challenges and explores emergent issues. Come find our booth if you'll be there! hubs.la/Q02tQ4cx0

We are excited to sponsor the ILTA EVOLVE conference next week in Charlotte, NC! EVOLVE addresses the legal tech community’s latest challenges and explores emergent issues. Come find our booth if you'll be there! hubs.la/Q02tQ4cx0
account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

In this final installment of his 3-part series, Compliance Services Practice Lead Christopher Camejo completes the trilogy by addressing the other requirements that requirement 6.3.1 impacts. Read it now! hubs.la/Q02tLSm60

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

- Watch our Impede Detection Platform Platform from last week to see the unveiling of the features included in the latest release of Impede v1.1. hubs.la/Q02tFT640

account_circle
TrustedSec(@TrustedSec) 's Twitter Profile Photo

Join us next week on April 30 for the ISC2 Cleveland Chapter member meeting at our HQ! Speakers Kevin Baker and Mark Cluse will present a talk titled 'Shield and Gavel: Forging a Resilient Legal and Cybersecurity Alliance.' Register now! hubs.la/Q02tCLMY0

Join us next week on April 30 for the @ISC2 Cleveland Chapter member meeting at our HQ! Speakers Kevin Baker and Mark Cluse will present a talk titled 'Shield and Gavel: Forging a Resilient Legal and Cybersecurity Alliance.' Register now! hubs.la/Q02tCLMY0
account_circle
SCYTHE(@scythe_io) 's Twitter Profile Photo

🦄  talks are up on our YouTube! Here's a snippet of our opening keynote from TrustedSec CEO Dave Kennedy: The Best Defense is Visibility Into Standard Attack Behavior.

🎯Subscribe to catch all the highlights from last week's EPIC event & to receive…

account_circle