Skip to content
  • About
    • Board of Directors
    • NMTC Bylaws
    • Policies
  • Events
    • All events
    • NM Women in Tech Awards
      • Nominations
      • WIT Wine Wisdom Event
      • WIT Scholarship
      • Sponsorships
        • Sponsor Hub
    • Tech Summit
      • Sponsorships
        • Sponsor Hub
  • Programming
    • Quantum Computing Peer Group
    • Women In Technology Peer Group
  • Membership
    • Member Profiles
    • Member Spotlight
    • NMTC News & Updates
  • Resources
    • Newsletter Archive
    • NM Business Incentives
    • Funding Forward
LinkedInYouTubeEmailPhonePhone
New Mexico Technology Council Logo New Mexico Technology Council Logo
Become a Member Today!
  • About
    • Board of Directors
    • NMTC Bylaws
    • Policies
  • Events
    • All events
    • NM Women in Tech Awards
      • Nominations
      • WIT Wine Wisdom Event
      • WIT Scholarship
      • Sponsorships
        • Sponsor Hub
    • Tech Summit
      • Sponsorships
        • Sponsor Hub
  • Programming
    • Quantum Computing Peer Group
    • Women In Technology Peer Group
  • Membership
    • Member Profiles
    • Member Spotlight
    • NMTC News & Updates
  • Resources
    • Newsletter Archive
    • NM Business Incentives
    • Funding Forward
  • About
    • Board of Directors
    • NMTC Bylaws
    • Policies
  • Events
    • All events
    • NM Women in Tech Awards
      • Nominations
      • WIT Wine Wisdom Event
      • WIT Scholarship
      • Sponsorships
        • Sponsor Hub
    • Tech Summit
      • Sponsorships
        • Sponsor Hub
  • Programming
    • Quantum Computing Peer Group
    • Women In Technology Peer Group
  • Membership
    • Member Profiles
    • Member Spotlight
    • NMTC News & Updates
  • Resources
    • Newsletter Archive
    • NM Business Incentives
    • Funding Forward
Cybersecurity Peer Group | Malicious or Malformed?Mia Petersen2019-11-07T19:24:49+00:00

Malicious or Malformed? Effective Software Analysis in Incident Response
With Sara Quesada, Louis Allen, and Nick Murietta

How do you handle information security alerts when produced by trusted third parties? When trust is established between organizations, it often leads to security staff questioning their security tools instead of the third party.  Join members of PNM’s cybersecurity team as they discuss the handling of security events when they involve software from trusted vendors and alerts raised with various next-generation security tools.

 

Cybersecurity Peer Group | Malicious ...
Register

Enter your email address below to receive a reminder message.

Please complete the Captcha

Date and Time

Thursday Oct 14, 2021
11:00 AM - 12:15 PM MDT

Location

Virtual - Zoom

 

Fees/Admission

Free

 

Enter your email address below to receive a reminder message.

Please complete the Captcha

GrowthZone - Membership Management Software
Share
Print Email Add to Calendar Facebook Twitter LinkedIn
Tell a Friend
Select Calendar Type
Google Yahoo iCal (Outlook, Apple, or other)

Upcoming Events

View Events

Quick Links

Members Login
Sign Up for Our Newsletter

200 Broadway Blvd NE
Albuquerque, NM 87102

Email: info@nmtechcouncil.org

Copyright ©2012 - New Mexico Technology Council | All Rights Reserved | Website Design and Development by Ingenuity Software Labs, Inc.