Zero-Day Vulnerability Response: A Case Study of Log4j
Date: April 8, 2022 Time: 8. a.m. MST/5 p.m. CEST/8:30 p.m. IST Topic: Zero-Day Vulnerability Response: A Case Study of Log4j Abstract: In December 2021, the discovery of a zero-day vulnerability in Apache Log4j, a Java-based logging framework, sent shockwaves through the security community. A zero-day vulnerability is a security flaw in a software […]
How SOCs Can Evolve in an Era of Advanced Cyberattacks
Date: April 6, 2022 Time: 4 p.m. BST/11 a.m. EDT/8:30 p.m. IST Topic: How SOCs Can Evolve in an Era of Advanced Cyberattacks Abstract: Cyberattacks today are more sophisticated and difficult to identify than ever. To respond to these cyber risks, today’s security operations centers (SOCs) need expertise in a variety of areas, including […]
How to Upgrade Your Ethical Hacking Skills Every Year
Date: March 29, 2022 Time: 11 a.m. EDT/3 p.m. GMT/8:30 p.m. IST Topic: How to Upgrade Your Ethical Hacking Skills Every Year Abstract: Ethical hacking is a crucial tool for protecting organizations’ digital assets and infrastructures, as it enables security gaps to be discovered and fixed before they are exploited. As part of red […]
Cloud Security: Best Practices for Securing Cloud Environments
Date: March 1, 2022 Time: 8.00 a.m. EST / 1.00 P.M. GMT / 6:30 p.m. IST Topic: Cloud Security: Best Practices for Securing Cloud Environments Abstract: Businesses are rapidly adopting cloud infrastructures for information storage and business operations. Cloud environments enable seamless data exchange, boost productivity, are reliable, and reduce operational and overhead costs. […]
How Can Continuous Automated Red Teaming Provide Scalability and Better Insights?
Date: February 24, 2022 Time: 7.30 p.m IST Topic: How Can Continuous Automated Red Teaming Provide Scalability and Better Insights? Abstract: With the emergence of such concerns as new attack vectors, advanced technologies, and rapid digitization, the cyberthreat landscape is rapidly evolving. Organizations need to identify their attack surfaces to mitigate cyber risks and […]