Cyber Security Conference at Sea (Cruise & Learn) SeptemberSep 05 2022 - SeptemberSep 10 2022 Europe/Madrid


Cruise and Update Your Security Skills at the Same Time. Join Fellow ISACA and ISC2 Members at the First Cyber Security At Sea Conference. A fun and economical way to earn CEUs and get a vacation with your family at the same time.

Cruise and Update Your Security Skills at the Same Time. Join Fellow ISACA and ISC2 Members at the First Cyber Security At Sea Conference. A fun and economical way to earn CEUs and get a vacation with your family at the same time.

Sailing from New York City on Board the Carnival Magic for a five-day cruise to Bermuda, you will have two six (6) hour days of Cyber Security Education and Training. The training will take place while we are at sea and you will experience two full days of fun-filled sun and enjoyment while we are ported in Bermuda!

Topics Covered on the Cruise


Wireless Risk Analysis and Security is session that provides a comprehensive view into the methods and mindset used by hackers to compromise wireless networks. Wireless can be complex and effective learning requires mastery of a new set of acronyms and how these technologies fit into the big picture.

The Security professional will learn the skills and knowledge required to understand how wireless networks operate. This course provides the basis for performing wireless reconnaissance and exploitation using tools found in both Kali Linux and Windows. Real world demo will demonstrate how Wi-Fi security Issues

Build a Security toolbox for free

Even the most secure IT system can have vulnerabilities that leave it exposed to cyber-attacks. Constantly changing network environments, social engineering schemes, and outdated or unpatched software are all threats that call for routine vulnerability testing.

Vulnerability testing, also called vulnerability assessment or analysis, is a one-time process designed to identify and classify security vulnerabilities in a network. Its purpose is to reduce the possibility of cyber criminals breaching your IT defenses and gaining unauthorized access to sensitive systems and data.

A vulnerability assessment will identify key information assets, determine vulnerabilities that threaten asset security, and offer recommendations to strengthen the organization’s security posture and reduce risk.

It this session, we will use Parrott OS, the flagship product of Parrot Security, which is a GNU/Linux distribution based on Debian and designed with security and privacy in mind. It includes a full portable laboratory for all kinds of cyber security operations, from pen testing to digital forensics and reverse engineering. It also includes everything needed to develop your own software and keep your data secure.

Participant will be given a USB stick that has the operating system configured on it. Participants will learn some of the tools and how to use them.

PowerShell for Auditors

PowerShell is a remarkably powerful tool that can be used by IT administrators to automate many aspects of their environment. But PowerShell really starts to shine when used to audit and secure a Microsoft Windows ecosystem.

Starting with an introduction to PowerShell, this PowerShell for Auditors seminar provides an overview of how you can use PowerShell to inventory your environment and also use it to secure Windows. By taking a hands-on approach, this seminar will teach you step-by-step what you need to know.

This one-day session covers PowerShell from beginning to end, exposing participants to the wide range of tools available through PowerShell. PowerShell is a fantastic tool that

will help you perform and automate your audits. All auditors should invest the time to get comfortable using PowerShell. You will add a new and valuable tool to your toolkit.

  1. Introduction to PowerShell
  2. PowerShell Scripting
  3. PowerShell Automation
  4. Auditing with PowerShell
  5. Favorite Tips and Tricks

BlockChain for Auditors

Blockchain is poised to be one of the greatest IT disruptors since the internet, accelerating breakthrough applications in a wide range of industries. According to Wikipedia, Blockchain is "an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way". Simply stated: Blockchain gives you the ability to trust others.

A Blockchain ensures the safety of business assets between member organizations. With the increase in business blockchains, blockchain professionals are now in high demand. They are accountable to develop, strategize and implement blockchain technologies for basic business operations. Come and learn what Blockchain is, and how you can get started with Blockchain technologies.

  1. What is Blockchain? (Really, what exactly is it?)
  2. Non-Technical Technology Overview (How does Blockchain work?)
  3. Benefits of Blockchain (Why should anyone even consider using this?)
  4. Use Cases (Where and for what applications is it appropriate?)
  5. Adoption (Who is really using it and for what?)
  6. Implementation (How do I get started?)
  7. Costs (What are the costs of using this technology?)
  8. Future of Blockchain (What is its future?)
Import to Google Calendar
  • Schedule
  • Guests
  • Attendance
  • Forecast
  • Comments

Weather data is currently not available for this location

Weather Report

Today stec_replace_today_date



stec_replace_current_temp °stec_replace_current_temp_units

Wind stec_replace_current_wind stec_replace_current_wind_units stec_replace_current_wind_direction

Humidity stec_replace_current_humidity %

Feels like stec_replace_current_feels_like °stec_replace_current_temp_units






Next 24 Hours

Powered by openweathermap.org