How Web Protocol Weaknesses Enable Layer 7 DoS Attacks

Date: April 17, 2025 Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST Topic: How Web Protocol Weaknesses Enable Layer 7 DoS Attacks Abstract:This webinar explores the inherent vulnerabilities within the design of web protocols that indirectly expose web pages to Layer 7 denial-of-service (DoS) attacks, regardless of the encryption protocol employed (e.g., […]
Hacking Payment Services: Real-World Business Logic Attack Scenarios

Date: April 15, 2025Time: 4:30 PM EEST | 9:30 AM EDT | 7:00 PM ISTTopic: Hacking Payment Services: Real-World Business Logic Attack Scenarios Watch Now Abstract: This webinar offers an in-depth exploration of real-world business logic attacks that impact the banking and fintech sectors. It examines how legitimate functions can be exploited to perform malicious […]
Identity Lifecycle and Privileged Account Management

Date: April 10, 2025 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: Identity Lifecycle and Privileged Account Management Watch Now Abstract: In the current threat landscape, where data breaches from both external and internal threat sources are rampant, identity and access management are crucial for preventing unauthorized access. As part of […]
Demystifying AI: Understanding the Power and Limitations of Generative AI

Date: March 28, 2025 Time: 9:00 AM CDT | 10:00 AM EDT | 7:30 PM IST Topic: Demystifying AI: Understanding the Power and Limitations of Generative AI Watch Now Abstract: AI is reshaping industries, yet misconceptions persist about its capabilities, risks, and ethical implications. In this talk, I will break down the fundamentals of AI and […]
Risk, Compliance, and Resilience: Key to Information Security Management

Date: March 26, 2025 Time: 2:30 PM CET | 9:30 AM EST | 7:00 PM IST Topic: Risk, Compliance, and Resilience: Key to Information Security Management Watch Now Abstract: In today’s rapidly evolving digital landscape, organizations face an increasing number of security threats, challenging their data security infrastructure. Compliance in risk management is among the most rudimentary […]