How Visibility and Machine Learning Makes Cyber Incident Detection and Response Results Better
Speakers: Yuri Diogenes, ECCU Professor / Author / Principal PM for Azure Security Center, Microsoft Sunil Varkey, VP – Forescout Technologies Inc. Topic: How Visibility and Machine Learning Makes Cyber Incident Detection and Response Results Better Date of Webinar: 15th September, 2021 Time and Location: 11:00 AM CST/ 9:30 PM IST Speaker Bio: Yuri Diogenes […]
How Threat Intelligence is Used to Reduce an Organization’s Risk Profile.
Speaker: Dr. Erdal Ozkaya Designation: CISO Comodo Topic: How Threat Intelligence is Used to Reduce an Organization’s Risk Profile. Date of Webinar: 1st Sep, 2021 Time and Location: 7.30 PM IST/ 12.00 AM AEST/ 4.00 PM CET Speaker Bio: Dr. Erdal Ozkaya is a passionate, solutions-focused professional with a comprehensive background in information technology, information […]
How Identity and Access Management Helps Empower Digital Transformation Initiatives
Speaker: Arun K. Singh Designation: CEO and Board Member, Ilantus Technologies Topic: How Identity and Access Management Helps Empower Digital Transformation Initiatives Date of Webinar: 31st Aug, 2021 Time and Location: 8:30am CDT/ 7:00pm IST/ 2:30pm BST Speaker Bio: Arun K. Singh joined Ilantus as CEO and Board Member after a successful history at Ernst […]
Information Security for Everyone – Where to Start with the Basics?
Speaker: Tino Šokić , Designation: Information Security Professional (Not just another security guy) Topic: Information Security for Everyone – Where to Start with the Basics? Date of Webinar: 28th July, 2021 Time and Location: 2.00pm Croatia time Speaker Bio: Tino Šokić is an Information Security and Privacy professional who has been in IT waters for […]
How AI Will Change Hacking: The Good and the Bad
Webinar Type: Panel Discussion Date: 27th July, 2021 Time: 12.00 PM EST/ 09.30 PM IST Topic: How AI Will Change Hacking: The Good and the Bad Abstract: Recent machine learning algorithms have produced positive results for cybersecurity, giving network security officers the chance to utilize these innovations to predict cyberattacks before an event occurs. Although AI is […]