MedTech Security: Protecting Connected Healthcare and Ensuring Compliance
Date: September 18, 2024 Time: 7:00 PM IST | 9:30 AM EDT | 8:30 AM CDT Topic: MedTech Security: Protecting Connected Healthcare and Ensuring Compliance Abstract: The healthcare industry’s increasing reliance on digital technologies makes it an essential target for ransomware attacks. However, with advancements in life-saving devices and implants, threats have evolved from mere […]
The Future of Ethical Hacking: New Tools, Techniques, and Trends
Date: September 17, 2024 Time: 1:30 PM WEST | 8:30 AM EDT | 6:00 PM IST Topic: The Future of Ethical Hacking: New Tools, Techniques, and Trends Abstract: With the rise in the complexity and volume of threats and attack vectors across the digital landscape, proactive measures for data security are the way forward. With […]
From Factory Floors to Smart Homes: Threat Intelligence for OT and IoT
Date: August 30, 2024 Time: 2:30 PM BST | 9:30 AM EDT | 7:00 PM IST Topic: From Factory Floors to Smart Homes: Threat Intelligence for OT and IoT Abstract: With the rise of end-user device networks such as IoT and OT in domestic and industrial environments, the threat and security landscape has also stretched […]
Reassessing Incident Response Strategies in Light of CrowdStrike Challenges
Date: August 28, 2024 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: Reassessing Incident Response Strategies in Light of CrowdStrike Challenges Abstract: The CrowdStrike event in July 2024 resulted in service disruptions globally across many industries, including nearly 60% of the Fortune 500 companies and more than half of the […]
Navigating the Digital Crime Scene: Tools & Techniques in Digital Forensics
Date: August 23, 2024 Time: 9:30 AM EDT | 8:30 AM CDT | 7:00 PM IST Topic: Navigating the Digital Crime Scene: Tools & Techniques in Digital Forensics Abstract: In today’s evolving threat landscape, where cyber threats are more rampant and sophisticated than ever, digital forensics have become crucial for responding to cyber attacks. An […]