Cloud Security: Avoiding Misconceptions and Employing Security Best Practices
Date: July 31, 2023 Time: 9:30 PM AEST | 5:00 PM IST | 12:30 PM BST Topic: Cloud Security: Avoiding Misconceptions and Employing Security Best Practices Abstract: Organizations moving to the cloud or subscribing to products that provide SaaS-based offerings tends to complicate the responsibilities of the service providers and the users. The common misconception […]
Top Skills Required to Start a Career in Cybersecurity
Date: July 12, 2023 Time: 5:00 PM IDT | 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST Topic: Top Skills Required to Start a Career in Cybersecurity Abstract: The cybersecurity market is expanding rapidly in response to the evolving threat landscape. This has led to an increase in demand for security professionals, […]
Incident Response Planning: Preparing for Network Security Breaches
Date: July 5, 2023 Time: 9:00 PM PST | 6:30 PM IST | 8:00 AM CDT Topic: Incident Response Planning: Preparing for Network Security Breaches Abstract: Security incidents and breaches can have catastrophic impacts on organizations. The main challenge with modern cybersecurity threats is that attackers are constantly evolving in their methodologies, and threat surfaces […]
Effective SOC Management and Incident Response
Date: June 21, 2023 Time: 8:30 AM MDT | 8:00 PM IST | 9:30 AM CDT Topic: Effective SOC Management and Incident Response Abstract: As organizations adopted remote work models and migrated over to the cloud, there has been an addition of newer attack surfaces, making global infrastructures even more vulnerable. Security Operations Center (SOC) […]
The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths
Date: June 13, 2023 Time: 3:00 PM BST | 6:00 PM AST | 7:30 PM IST Topic: The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths Abstract: In 2022, according to the Verizon Data Breach Investigations Report, 82% of data breaches involved human error. Nevertheless, the investment in remediating this threat vector has been […]