Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them
Date: March 26, 2024 Time: 12:30 AM AEDT | 2:30 PM CET | 7:00 PM IST Topic: Five Key Elements of Cybersecurity Framework and How Organizations Can Best Implement Them Abstract: Ransomware is one of modern cybersecurity’s most pervasive and damaging threats. To combat this ever-evolving threat, organizations must adopt a comprehensive approach to recovery. […]
A Guide to Incident Response Framework: Business Email Compromise
Date: March 21, 2024 Time: 10:00 AM EDT | 3:00 PM CET | 7:30 PM IST Topic: A Guide to Incident Response Framework: Business E-mail Compromise Abstract: This session focuses solely on one of (if not the most) common cyber Incident Responders (IRs) encounters today. Business E-mail Compromises (BEC) happen every day to organizations of […]
Inspiring Women in Cybersecurity: A CISO’s Journey to Success
Date: March 15, 2024 Time: 10:30 AM EDT | 3:30 PM CET | 8:00 PM IST Topic: Inspiring Women in Cybersecurity: A CISO’s Journey to Success Abstract: In the current digital landscape, where cyber threats are rapidly evolving, the role of Chief Information Security Officers (CISOs) in safeguarding an organization’s digital architecture has become paramount. […]
Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators
Date: December 18, 2024 Time: 8:30 AM EST | 7:30 AM CST | 7:00 PM IST Topic: Anti-Forensics Tactics Exposed: Countermeasures for Digital Investigators Abstract: The current threat landscape is evolving constantly, giving rise to more sophisticated threats and attack vectors. Forensic investigations are not exempt from these influences. As cybercriminals further advance their efforts, […]
Leveraging Advanced Forensic Techniques for Efficient Incident Response
Date: January 23, 2025 Time: 8:30 AM EST | 7:30 AM CST | 7:00 PM IST Topic: Leveraging Advanced Forensic Techniques for Efficient Incident Response Register Abstract: A practical and agile incident response plan is critical for minimizing damage in the current threat landscape, which witnesses relentless cyberattacks. Incorporating digital forensics into incident response processes […]