Effective SOC Management and Incident Response
Date: June 21, 2023 Time: 8:30 AM MDT | 8:00 PM IST | 9:30 AM CDT Topic: Effective SOC Management and Incident Response Abstract: As organizations adopted remote work models and migrated over to the cloud, there has been an addition of newer attack surfaces, making global infrastructures even more vulnerable. Security Operations Center (SOC) […]
The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths
Date: June 13, 2023 Time: 3:00 PM BST | 6:00 PM AST | 7:30 PM IST Topic: The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths Abstract: In 2022, according to the Verizon Data Breach Investigations Report, 82% of data breaches involved human error. Nevertheless, the investment in remediating this threat vector has been […]
The Future of Digital Forensics: Trends and Emerging Technologies
Date: June 9, 2023 Time: 7:00 PM IST | 3:30 PM CEST | 9:30 AM EDT Topic: The Future of Digital Forensics: Trends and Emerging Technologies Abstract: Digital forensics is the process of discovering and analyzing digital evidence related to cyber crime to uncover information that can be presented in a court of law. However, […]
Conducting Pen Testing in Cloud Settings to Secure Business Environments
Date: June 8, 2023 Time: 7:00 PM IST | 9:30 AM EDT | 2:30 PM CET Topic: Conducting Pen Testing in Cloud Settings to Secure Business Environments Abstract: As businesses rely more and more on cloud-based infrastructure to support their critical activities, securing these environments has become more important than ever. Cloud-based attacks are increasing […]
Preparing Your Team for Incident Response: Training and Simulation Exercises
Date: May 18, 2023 Time: 5:00 PM IDT | 10:00 AM EDT | 7:30 PM IST Topic: Preparing Your Team for Incident Response: Training and Simulation Exercises Abstract: As the threat landscape grows increasingly treacherous, establishing a plan for responding to cyber incidents is now a vital component of every organization’s security strategy. While organizations […]