Why You Should Learn Ethical Hacking, Network Security, Digital Forensics, and SOC for a Perfect Launch Pad into Cybersecurity
Date: April 5, 2023 Time: 7:00 PM IST | 3:30 PM CEST | 2:30 PM BST | 5:30 PM GST Topic: Why You Should Learn Ethical Hacking, Network Security, Digital Forensics, and SOC for a Perfect Launch Pad into Cybersecurity Abstract: Cybersecurity is classified across various fields based on the function, scope of operation, and […]
Monitoring Threats in All Types of Cloud Environments
Date: March 28, 2023 Time: 9:30 PM MYT | 7:00 PM IST | 8:30 AM EST Topic: Monitoring Threats in All Types of Cloud Environments Abstract: As cloud adoption rapidly expands, organizations face many security threats that can compromise their cloud infrastructure and data. Therefore, companies must have effective threat-monitoring tools and strategies to safeguard […]
Penetration Testing Challenges for Cloud-Based Applications (IaaS, PaaS, SaaS)
Date: March 24, 2023 Time: 7:00 PM IST, 8:30 AM EST, 2:30 PM CET. Topic: Penetration Testing Challenges for Cloud-Based Applications (IaaS, PaaS, SaaS) Abstract: With security being impacted by the inherent shared responsibility model for the cloud environment, cloud applications (largely in IaaS and PaaS models) are the responsibility of client businesses. Though not […]
Future skills: Sustaining women in cybersecurity
Date: March 9, 2023 Time: 7:30 PM IST / 3:00 PM CET / 2:00 PM GMT / 6:00 PM GST Topic: Future Skills: Sustaining Women in Cybersecurity Abstract: The technology industry has witnessed massive changes in recent months. Emerging technologies and platforms like Metaverse and ChatGPT are changing the industry landscape—so too is the recent […]
Introducing Novel Technologies for Effective Threat Hunting
Date: March 7, 2023 Time: 9 AM CST/10 AM EST/ 7 AM PST / 8:30 PM IST Topic: Introducing Novel Technologies for Effective Threat Hunting Abstract: Threat hunting is the proactive search for indicators of compromise (IOCs) and malicious activity on a network. It is a critical component of an organization’s cybersecurity strategy, as it […]