Women in Cyber: Shaping the Future of Security
Date: March 8, 2024 Time: 7:00 AM MST | 8:00 AM CST | 9:00 AM EST | 7:30 PM IST Topic: Women in Cyber: Shaping the Future of Security Abstract: The scope of cybersecurity is growing in direct proportion to expansive digitalization across the globe, increasing the demand for qualified information security professionals. Nevertheless, even […]
Data Privacy and Compliance: Data Governance Framework for Effective Data Management
Date: February 21, 2024 Time: 3:00 PM CET | 9:00 AM EST | 7:30 PM IST Topic: Data Privacy and Compliance: Data Governance Framework for Effective Data Management Abstract: In the current digital landscape, regulations and compliance for data privacy are non-negotiable due to vast amounts of sensitive information being generated and processed globally. Security […]
Business-First Cybersecurity Leadership
Date: February 16, 2024 Time: 9:30 AM EST | 2:30 PM GMT | 8:00 PM IST Topic: Business-First Cybersecurity Leadership Abstract: As cybercrimes are rising dramatically, the need for robust cybersecurity leadership is inevitable. Navigating cybersecurity leadership requires a complex and continuous balance of security and business priorities. The current webinar explores the intricacies of […]
A Guide to Incident Response Framework: Ransomware Negotiations
Date: February 15, 2024 Time: 9:30 AM EST | 8:30 AM CST | 8:00 PM IST Topic: A Guide to Incident Response Framework: Ransomware Negotiations Abstract: This webinar session provides real-world-based training focused on the Incident Response (IR) forensics vendor’s viewpoint of interacting, negotiating, and settling with a ransomware threat actor. Including what role the […]
From Detection to Recovery: A Comprehensive Approach to Cyber Resilience
Date: February 9, 2024 Time: 3:30 PM CAT | 8:30 AM EST | 7:00 PM IST Topic: From Detection to Recovery: A Comprehensive Approach to Cyber Resilience Abstract: The present-day cybersecurity primarily focuses on developing cyber resilience for businesses, i.e., strengthening an organization’s ability to prepare, respond, and recover from cyberattacks. Detection is the first […]