Ethical Hacking: Emerging Technologies that Require Red Teamers
Date: April 29, 2022 Time: 9:30 a.m. MDT/11:30 a.m. EDT/4:30 p.m. BST/9 p.m. IST Topic: Ethical Hacking: Emerging Technologies that Require Red Teamers Abstract: Thanks to emerging technologies like cloud computing, the Internet of Things, and blockchain, businesses have become more cost effective and efficient. However, these developments have also created new attack surfaces […]
What Is the Future of Cybersecurity?
Date: April 28, 2022 Time: 9 a.m. CDT/3 p.m. BST/7:30 p.m. IST Topic: What Is the Future of Cybersecurity? Abstract: With the increasing integration of digital technology into daily life, cyberthreats have become far more prevalent. Advanced cyberattacks are on the rise as organizations rush to incorporate innovative technologies into their business agendas and […]
Skills, Trends, and Challenges in Modern Network Defense
Date: April 14, 2022 Time: 11:30 a.m. EDT/4:30 p.m. BST/9 p.m. IST Topic: Skills, Trends, and Challenges in Modern Network Defense Abstract: Emerging technologies are transforming global network security environments and perimeter security. Advancements in cloud computing and storage, the Internet of Things, and remote access have challenged IT professionals to implement innovative and […]
Why Addressing Cybersecurity Vulnerabilities Is a Top Priority
Date: April 12, 2022 Time: 8 a.m. EDT/1 p.m. BST/5:30 p.m. IST Topic: Why Addressing Cybersecurity Vulnerabilities Is a Top Priority Abstract: All businesses need to be vigilant in protecting themselves against cybersecurity risks and vulnerabilities—though considering the ever-expanding list of cybersecurity vulnerabilities, enterprises may sometimes feel as if they are waging a losing […]
Zero-Day Vulnerability Response: A Case Study of Log4j
Date: April 8, 2022 Time: 8. a.m. MST/5 p.m. CEST/8:30 p.m. IST Topic: Zero-Day Vulnerability Response: A Case Study of Log4j Abstract: In December 2021, the discovery of a zero-day vulnerability in Apache Log4j, a Java-based logging framework, sent shockwaves through the security community. A zero-day vulnerability is a security flaw in a software […]