̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

Archived Events

̽»¨ÊÓÆµ Tradeshow

Event Date: May 06, 2025
Hosted By: Babel Street, Flashpoint, GME, Recorded Future, ShadowDragon & ̽»¨ÊÓÆµ
Location: Tampa, FL
Thank you for your interest in our OSINT Panel at SOF Week: Empowering the Warfighter: Advancing OSINT Capabilities   The discussion highlighted the latest advancements in OSINT technology, the integration of AI and automation, and strategies for leveraging ...
Flashpoint-microsite.png
Flashpoint Virtual Event

Event Date: August 14, 2024
Hosted By: Flashpoint & ̽»¨ÊÓÆµ
As generative artificial intelligence (AI) continues to make waves in the cybersecurity space, it's time to adapt your research approach! This webinar with Flashpoint explored how ...
Flashpoint-microsite.png
Flashpoint Virtual Event

Event Date: January 09, 2024
Hosted By: Flashpoint & ̽»¨ÊÓÆµ
Following the tragic events in the Middle East in October, a spectrum of cyber actors turned to social media to express their sentiment surrounding the crisis. Shortly thereafter, hacktivists joined the fray, engaging in defacements and Distributed Denial of Service (DDoS) attacks on various nation-state websites ...
Flashpoint-microsite.png
Flashpoint Virtual Event

Event Date: September 07, 2022
Hosted By: Flashpoint & ̽»¨ÊÓÆµ
Schools find themselves under tremendous pressure from all types of outside threats- physical, verbal, and social. Students are exposed daily to cyberbullying, social media attacks, and corruption of trusted sites. School faculties are ...

Resources


2025 State of Software Security
Report

2025 State of Software Security

Explore how rising software threats, security debt, and AI impact risks in 2025. In 2025, software threats are already on the rise. Security debt grows, attack surfaces are even more complex, and AI in code generation is reshaping risks. This report from Veracode explores key metrics for security maturity, why prioritizing high-impact risks is crucial, and the strategies needed to build a resilient, adaptive security plan that focuses on what matters most.


Fill out the form below to view this Resource.