Incident Response Planning: Preparing for Network Security Breaches
Date: July 5, 2023 Time: 9:00 PM PST | 6:30 PM IST | 8:00 AM CDT Topic: Incident Response Planning: Preparing for Network Security Breaches Abstract: Security incidents and breaches can have catastrophic impacts on organizations. The main challenge with modern cybersecurity threats is that attackers are constantly evolving in their methodologies, and threat surfaces […]
Effective SOC Management and Incident Response
Date: June 21, 2023 Time: 8:30 AM MDT | 8:00 PM IST | 9:30 AM CDT Topic: Effective SOC Management and Incident Response Abstract: As organizations adopted remote work models and migrated over to the cloud, there has been an addition of newer attack surfaces, making global infrastructures even more vulnerable. Security Operations Center (SOC) […]
The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths
Date: June 13, 2023 Time: 3:00 PM BST | 6:00 PM AST | 7:30 PM IST Topic: The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths Abstract: In 2022, according to the Verizon Data Breach Investigations Report, 82% of data breaches involved human error. Nevertheless, the investment in remediating this threat vector has been […]
The Future of Digital Forensics: Trends and Emerging Technologies
Date: June 9, 2023 Time: 7:00 PM IST | 3:30 PM CEST | 9:30 AM EDT Topic: The Future of Digital Forensics: Trends and Emerging Technologies Abstract: Digital forensics is the process of discovering and analyzing digital evidence related to cyber crime to uncover information that can be presented in a court of law. However, […]
Conducting Pen Testing in Cloud Settings to Secure Business Environments
Date: June 8, 2023 Time: 7:00 PM IST | 9:30 AM EDT | 2:30 PM CET Topic: Conducting Pen Testing in Cloud Settings to Secure Business Environments Abstract: As businesses rely more and more on cloud-based infrastructure to support their critical activities, securing these environments has become more important than ever. Cloud-based attacks are increasing […]