Best Threat Hunting Practices for Security Operations Centers
Date: December 21, 2021 Time: 9 AM CST /8:00 AM MST/ 10:00 AM EST /8:30 PM IST Topic: Best Threat Hunting Practices for Security Operations Centers Abstract: As cybercrime continues to rise, it costs companies around the world millions of dollars every year. In response to the increasing frequency of malicious attacks, the most difficult challenge […]
Can Current Security Awareness Programs Help Mitigate Vulnerabilities Caused by Human Factors?
Date: December 9th, 2021 Time: 9 AM EST / 3 PM CET / 7:30 PM IST Topic: Can Current Security Awareness Programs Help Mitigate Vulnerabilities Caused by Human Factors? Abstract: The human factor is the weakest link in an organization’s security framework, and one of the most important and challenging tasks for CISOs is to […]
Blockchain and Cloud Computing: Applications in FinTech
Date: November 30, 2021 Time: 7:30 PM IST/ 4 PM EET/ 9 AM EST Topic: Blockchain and Cloud Computing: Applications in FinTech Abstract: While centralized servers facilitate better data management, they can also lead to cyber risks such as data theft and a single point of failure. However, this security and accessibility issue can be resolved […]
DevSecOps Best Practices You Need to Know to Secure Your Applications
Date: 25th Nov, 2021 Time: 4.00 PM EEST/ 6 AM PST/7:30PM IST Topic: DevSecOps Best Practices You Need to Know to Secure Your Applications Abstract: Penetration testing plays a critical role in identifying application and software vulnerabilities to remediate the flaws. For faster business operations, applications are now being developed in shorter agile cycles. […]
Zero Trust Network: Going Beyond the Traditional Perimeter Defense
Date: 24th Nov, 2021 Time: 8.45 AM ET/7.45 AM CDT/7.15 PM IST Topic: Zero Trust Network: Going Beyond the Traditional Perimeter Defense Abstract: Zero-Trust Network Access (ZTNA) implies a security posture where no individual user or device is considered trusted and scrutinized through identity and access management security protocols. Where the traditional security postures considered users and […]