The Big Security Challenge, Today

THE BIG SECURITY CHALLENGEa, TODAY

Name: Sergio Pohlmann, VP of GTISUL Topic: The Big Security Challenge, Today Date of Webinar: 29th March, 2019 Time and Location: 6:30pm IST/ 1pm GMT Speaker Bio: Sergio Pohlmann is a Computer Engineer, Experienced in the IT area since the 80’s. He was a security consultant to various banks and business, and the principal teacher […]

Incident Response Readiness: What to Do Before the Incident

INCIDENT RESPONSE READINESS: WHAT TO DO BEFORE THE INCIDENT

Name: Lawrence Taub, Director of Security Incident Response and Threat Management at Global Payments and Adjunct Professor at Florida Institute of Technology Topic: Incident Response Readiness- What to Do Before the Incident Date of Webinar: 28th March, 2019 Time and Location: 8:00 am EST/5:30pm IST/1pm GMT   Speaker Bio: Dr. Lawrence Taub has over 15 […]

How Can We Work Toward Security in Machine Learning?

HOW CAN WE WORK TOWARD SECURITY IN MACHINE LEARNING

Name: Dr. Catherine Huang Topic: How can we work towards security in machine learning Date of Webinar: 21st March, 2019 Time and Location: 9pm PST / 9:30am IST/ 6:00am GMT Speaker Bio: Dr. Catherine Huang is a Principal Engineer in McAfee LLC. Her expertise is adversarial machine learning, deep learning and artificial intelligence for security […]

Cloud Security

Dhananjaya Naronikar

Name: Dhananjaya Naronikar, Head of Cyber Security and Privacy Advisory at SxiQ Topic: Cloud Security Date of Webinar: 13th March, 2019 Time and Location: 5pm AEST/ 11:30am IST/ 7am GMT   Speaker Bio: Dhananjaya is a Cyber Security, Data Protection and Architecture Executive with 21+ years’ experience. He’s currently the Head of Cyber Security & […]

Cybersecurity for RPA Programs

CYBERSECURITY FOR RPA PROGRAMS

Name: Roberto Valdez Topic: Cybersecurity for RPA Programs Date of Webinar: 7th March, 2019 Time and Location: 8:00 am EST/6:30pm IST/1pm GMT   Speaker Bio: Roberto Valdez, CPA, CISA, CISM is a Manager with Kaufman Rossin’s Cybersecurity Services. He performs advisory and assurance engagements that include SOC 1, 2, and 3, IT risk assessments, phishing […]