Integrating Security into the CI/CD Pipeline
Date: September 7, 2023 Time: 2:00 PM WAT | 7:00 PM MDT | 3:00 PM CEST | 6:30 PM IST Topic: Integrating Security into the CI/CD Pipeline Abstract: The CI/CD pipeline plays a crucial role in streamlining and automating various stages of application development, such as compiling, testing, analysis, security, deployment, and packaging. However, this […]
Career Tips for a Successful Cyber Security Transition
Date: August 28, 2023 Time: 9:00 PM CDT / 10:00 AM EDT/ 7:30 PM IST Topic: Career Tips for a Successful Cyber Security Transition Abstract: Are you looking to switch careers and break into cyber security? Transitioning to cyber security involves many factors. In this webinar, you will learn more about cyber security career opportunities, […]
Navigating the Changing Landscape of Information Security Leadership: Best Practices
Date: August 24, 2023 Time: 4:00 PM CEST | 7:30 PM IST | 8:00 AM MDT | 3:00 PM BST | 10:00 AM EDT Topic: Navigating the Changing Landscape of Information Security Leadership: Best Practices Abstract: The ever-evolving landscape of information security leadership has become increasingly complex, with emerging technologies, regulatory requirements, and threat actors. […]
Navigating the Cyber Battlefield: Leveraging MITRE ATT&CK Tactics and Techniques
Date: August 21, 2023 Time: 2:30 PM WEST | 9:30 AM EDT | 3:30 PM CEST | 7:00 PM IST Topic: Navigating the Cyber Battlefield: Leveraging MITRE ATT&CK Tactics and Techniques Abstract: The current threat landscape necessitates organizations to proactively detect and remediate vulnerabilities before attackers discover and exploit them. As the threat landscape continues […]
Network Security Fundamentals: Understanding Threats and Vulnerabilities
Date: August 18, 2023 Time: 8:00 A.M. MDT | 7:30 P.M. IST | 9:00 A.M. CDT Topic: Network Security Fundamentals: Understanding Threats and Vulnerabilities Abstract: Network security secures communications between users and assets and creates a shield that protects organizations from external and internet threats. It ensures that users have access to specific parts of […]