Understanding the Role of MITRE ATT&CK Framework in Incident Response
Date: January 27, 2023 Time: 8:00 am MST/9 am CST /8.30 pm IST Topic: Understanding the Role of MITRE ATT&CK Framework in Incident Response Abstract: Cybersecurity incidents have been a major issue for corporations and governments worldwide. Commercializing cybercrime for profit, extortion (also known as ransomware), and fraud necessitate enterprises to take proactive countermeasures to […]
Cybersecurity Skills Essential For Combating Cyber Risks Today
Date: January 18, 2023 Time: 7:30 p.m. IST/9 a.m. EST/8 a.m. CST/2 p.m. GMT Topic: Cybersecurity Skills Essential For Combating Cyber Risks Today Abstract: With institutions and businesses of all sizes relying heavily on computerized operations to manage their daily needs, the threat to data security is increasing rapidly. While technological advancements continue transforming the […]
True cyber emergency stories and leadership action plans
Date: January 17, 2023 Time: 7 p.m. IST/8.30 a.m. EST/2.30 p.m. CET. Topic: True Cyber Emergency Stories and Leadership Action Plans Abstract: Cyberthreat incidents are a concern as they impact business continuity, necessitating the need for more emphasis on cybersecurity. Over the past few years, there has been a dramatic increase in major cybersecurity incidents […]
Hacking Trends for Web Applications and What We Can Expect In 2023
Date: December 21, 2022 Time: 8.00 p.m. IST/9.30 a.m. EST/3.30 p.m. CET Topic: Hacking Trends for Web Applications and What We Can Expect In 2023 Abstract: With organizations shifting their digital infrastructure to the cloud, the frontier of security and associated threats and vulnerabilities have changed drastically. Technological advancements such as remote access, application programming […]
Will AI and ML Play a Role in the Future of Cybersecurity?
Date: December 9, 2022 Time: 6.30 p.m. GMT/8.30 a.m. CST/ 8 p.m. IST Topic: Will AI and ML Play a Role in the Future of Cybersecurity? Abstract: With the great shift in IT infrastructure due to the introduction of various novel technologies such as cloud, IoT, blockchain, etc., a new frontier has emerged for threat […]