How CISOs Should Approach Critical Cloud Security Issues

How CISOs Should Approach Critical Cloud Security Issues

Date: June 30, 2022 Time: 9:30 a.m. EDT/2:30 p.m. BST/7:00 p.m. IST Topic: How CISOs Should Approach Critical Cloud Security Issues Abstract: Cloud storage has become indispensable for many businesses, as it minimizes costs and improves overall efficiency. While cloud computing is a boon for enterprises, however, failing to ensure cloud security could eliminate all […]

Does Remote Work Present a Major Cybersecurity Threat?

Does Remote Work Present a Major Cybersecurity Threat eccu

Date: June 29, 2022 Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. IST Topic: : Does Remote Work Present a Major Cybersecurity Threat? Abstract: Not everyone has the cybersecurity skills or awareness to stay safe on the internet, where hackers often use sophisticated tactics to prey on unsuspecting users. This is especially problematic for employees who […]

Network Security Essentials: Attacks and Defense Strategies

Network Security Essentials Attacks and Defense Strategies ECCU

Date: June 23, 2022 Time: 10 a.m. EDT/11 a.m. BRT/7:30 p.m. IST Topic: : Network Security Essentials: Attacks and Defense Strategies Abstract: Network security encompasses all physical and virtual assets that enable data transmission between nodes or endpoints. As a result, network defense is a broad and crucial cybersecurity function that covers a wide range […]

The Dos and Don’ts of API Security

The Dos and Don’ts of API Security

Date: June 22, 2022 Time: 9 a.m. MDT/4 p.m. BST/8:30 p.m. IST Topic: : The Dos and Don’ts of API Security Abstract: Cybercrime is on the rise, and no technology is immune to attacks by malicious actors. Application programming interfaces (APIs) are becoming more prevalent in cloud computing, the Internet of Things, and mobile applications, […]

Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments

Cyberthreat Hunting and Intelligence in IoT Environments

  Date: May 27, 2022 Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. IST Topic: Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments Abstract: Cybersecurity is a never-ending fight. As security professionals develop advanced strategies to stop one attack, malicious hackers invent more sophisticated tactics for penetrating networks and covertly stealing confidential data. Cyberthreat […]