Reassessing Incident Response Strategies in Light of CrowdStrike Challenges
Date: August 28, 2024 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: Reassessing Incident Response Strategies in Light of CrowdStrike Challenges Abstract: The CrowdStrike event in July 2024 resulted in service disruptions globally across many industries, including nearly 60% of the Fortune 500 companies and more than half of the […]
Navigating the Digital Crime Scene: Tools & Techniques in Digital Forensics
Date: August 23, 2024 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: Navigating the Digital Crime Scene: Tools & Techniques in Digital Forensics Abstract: In today’s evolving threat landscape, where cyber threats are more rampant and sophisticated than ever, digital forensics have become crucial for responding to cyber attacks. An […]
Proactive Protection: Applying Threat Intelligence to Emerging Tech Trends
Date: August 22, 2024 Time: 4:30 PM EAT | 9:30 AM EDT | 7:00 PM IST Topic: Proactive Protection: Applying Threat Intelligence to Emerging Tech Trends Abstract: Increased associated security threats frequently accompany the growth and innovation in digital technologies. The same could be said for emerging technologies such as AI, IoT, cloud, blockchain, and […]
Security Audit Essentials: Tips for Effective Governance and Risk Management
Date: August 20, 2024 Time: 2:30 PM GMT+1 | 8:30 AM CDT | 7:00 PM IST Topic: Security Audit Basics: Tips for Effective Governance and Risk Management Abstract: Data security is paramount for businesses in terms of information security compliance with regulatory requirements. Safeguarding organizational assets and data in compliance with government regulations mandates that […]
AI-Powered Threat Hunting for Ethical Hacking
Date: August 8, 2024 Time: 2:30 PM WEST | 9:30 AM EDT | 7:00 PM IST Topic: AI-Powered Threat Hunting for Ethical Hacking Abstract: In the rapidly evolving threat landscape, the traditional methods for detection and response to threats struggle in the face of sophisticated cyberattacks. Hence, security experts weigh the benefits of adopting AI-driven […]