How SOCs Can Evolve in an Era of Advanced Cyberattacks
Date: April 6, 2022 Time: 4 p.m. BST/11 a.m. EDT/8:30 p.m. IST Topic: How SOCs Can Evolve in an Era of Advanced Cyberattacks Abstract: Cyberattacks today are more sophisticated and difficult to identify than ever. To respond to these cyber risks, today’s security operations centers (SOCs) need expertise in a variety of areas, including […]
How to Upgrade Your Ethical Hacking Skills Every Year
Date: March 29, 2022 Time: 11 a.m. EDT/3 p.m. GMT/8:30 p.m. IST Topic: How to Upgrade Your Ethical Hacking Skills Every Year Abstract: Ethical hacking is a crucial tool for protecting organizations’ digital assets and infrastructures, as it enables security gaps to be discovered and fixed before they are exploited. As part of red […]
Cloud Security: Best Practices for Securing Cloud Environments
Date: March 1, 2022 Time: 8.00 a.m. EST / 1.00 P.M. GMT / 6:30 p.m. IST Topic: Cloud Security: Best Practices for Securing Cloud Environments Abstract: Businesses are rapidly adopting cloud infrastructures for information storage and business operations. Cloud environments enable seamless data exchange, boost productivity, are reliable, and reduce operational and overhead costs. […]
How Can Continuous Automated Red Teaming Provide Scalability and Better Insights?
Date: February 24, 2022 Time: 7.30 p.m IST Topic: How Can Continuous Automated Red Teaming Provide Scalability and Better Insights? Abstract: With the emergence of such concerns as new attack vectors, advanced technologies, and rapid digitization, the cyberthreat landscape is rapidly evolving. Organizations need to identify their attack surfaces to mitigate cyber risks and […]
Why You Should Pursue a Cybersecurity Degree in 2022
Date: February 23, 2022 Time: 8:30 a.m. PST/4:30 p.m. GMT/10 p.m. IST Topic: Why You Should Pursue a Cybersecurity Degree in 2022 Abstract: Although cybersecurity is the backbone of every organization’s defensive strategy, very few devote enough attention to it. A widespread lack of security awareness and the daunting cybersecurity skills gap increase the risks […]