Viewing 1 current event matching “cybersecurity” by Date.
|Sort By: Date||Event Name, Location , Default|
Best Practices for API-Driven React Applications with Scott Radcliff
React is on fire! Companies around the world are trying to take advantage of the way React makes web applications fast, responsive, and easier to develop. That said, what about the API? If your API is slow or not optimized, that could severely effect your cool new React app and end up as the choke point for negative customer experiences.
In this talk, we'll build a React app that is driven by an API written in Rails, though we'll cover a great deal of best practices, examples, and considerations that can be applied to a client-server architecture written in any language.
You'll leave this talk with an understanding of the APIs role in React applications, things to look for when working with or building an API, and practical knowledge to take back into your workplace or personal projects.
Speaker Bio: Scott Radcliff is an expert software developer in the Toledo area. He's built web applications using numerous programming languages and technology stacks accomplishing a variety of tasks from the very simple to enterprise-grade. He enjoys building applications that help people do things that they previously couldn't, and he loves Ruby.
Scott is a freelance developer and is currently taking on new customers.
Viewing 4 past events matching “cybersecurity” by Date.
|Sort By: Date||Event Name, Location , Default|
WednesdayMar 22, 2017
CyberSecurity Nexus Fundamentals
–University of Toledo, University Computing Center
The Northwest Ohio ISACA Chapter will be hosting a full-day CyberSecurity Nexus Fundamentals (CSX) review program. As the entry point into the cybersecurity program, CSX offers a certificate in the introductory concepts that frame and define the standards, guidelines and practices of the industry.
The course/program is designed to cover all of the topic areas necessary to prepare you for taking and passing the CSX certificate exam.
Members and non-members alike are welcome to participate in this training program.
WednesdayJun 21, 2017
Cyber Security: Confidentiality, Integrity, Availability
–Advanced Manufacturing Training Center at UT Scott Park
Cyber security is a relevant topic right now. Regardless of the type of business you operate, if you work online you are at risk.
Cyber security is not just a technology based issue. Organizations must incorporate cyber risk management into their day-to-day operations. They must also be prepared to respond to a cyber attack, restore operations and ensure that the company’s assets and reputation are protected.
$65/person, second person from same company is $40.
FridayNov 17, 2017
Threat on Your Doorstep: Cybersecurity for Executives
–BGSU at Levis Commons
Join Bowling Green State University and Michigan Cyber Range for a FREE cybersecurity workshop!
“Threat on Your Doorstep” provides an in-depth analysis of the current threat landscape that ensures your organization is prepared to address cybersecurity incidents and threats.
With the guidance of instructor Dr. Joe Adams, participants will explore topics such as phishing, cyber terrorism, social engineering, incident response, hacking and more.
Deadline to RSVP is November 1, 2017.
Toledo Web Professionals - The Cybersecurity Roadshow with Tom Germain
This traveling cybersecurity workshop seeks to bring cybersecurity awareness to creators, developers, and businesses.
You've read the headlines about the latest hack affecting millions of web users and/or credit card holders, but did you know that, possibly and unwittingly, your own website, router or web connected device could be part of a botnet used in attacks?
What never ceases to amaze is how many businesses and individuals fail to protect themselves from the hordes of hackers working in a multi-billion dollar a year illegal industry. This workshop aims to awaken you to the many dangers as well as to offer real solutions to defending yourself and your business from what could be a disastrous breach of security.
• Profile of a "black hat" hacker and what they target
• Types of attacks and how they're achieved
• Legal aspects (liability, etc.)
• Social engineering
• Sources of timely security alerts
• Basic prevention
• Penetration testing
• Web site and web server security
• Desktop and Mobile security
• Anti-virus products comparisons
Truthfully, everybody who connects to the Internet should know this stuff, so come on over, and become a more savvy, secure, and responsible Internet user!
About Stuart Budden Stuart Budden is an IT professional, co-owner and CEO of Nivsys Inc, and a professor teaching cyber security at Fanshawe College, in London, Ontario.
About Tom Germain Tom Germain is CEO of Coder Scoop Inc., a web and mobile development company in London, who has long concerned himself with security on behalf of his clients and started this workshop in May of 2017.