Exploring the Intersection of Digital Forensics and Identity Management
Date: June 26, 2024 Time: 7:00 PM IST | 8:30 AM CDT | 2:30 PM BST Topic: Exploring the Intersection of Digital Forensics and Identity Management Abstract: With the rise in the sophistication of cyberattacks, it has become imperative for cybersecurity experts to develop novel and interdisciplinary approaches to mitigation strategies. One such approach is […]
Decentralized Security: Role of Blockchain in Cybersecurity
Date: June 24, 2024 Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST Topic: Decentralized Security: Role of Blockchain in Cybersecurity Abstract: In an age where cyber threats are evolving rapidly, traditional security measures fall short of adequate mitigation capabilities. With digital technologies driving decentralization and related innovations, blockchain emerges as a […]
Deep Packet Inspection Analysis: Examining One Packet Killers
Date: June 20, 2024Time: 4:30 PM CEST | 10:30 AM EDT | 8:00 PM ISTTopic: Deep Packet Inspection Analysis: Examining One Packet Killers Abstract: Security Operations Center (SOC) teams monitor network traffic using SIEM and IPS solutions, along with other security tools. However, these tools can sometimes fall short in their capability, particularly when faced […]
Leveraging Threat Intelligence for Security: A Beginner’s Guide
Date: June 18, 2024 Time: 7:00 AM PDT | 10:00 AM EDT | 7:30 PM IST Topic: Leveraging Threat Intelligence for Security: A Beginner’s Guide Abstract: In the current threat landscape, threat intelligence is a crucial tool against evolving risks. Leveraging threat intelligence involves gathering security intelligence from various sources, including open-source feeds to commercial […]
The Human Element: Understanding Social Engineering Tactics
Date: May 28, 2024 Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST Topic: The Human Element: Understanding Social Engineering Tactics Abstract: In today’s dynamic threat landscape, the one constant element persistently targeted is the human link, often because it is the weakest link in the security chain. Attackers constantly and relentlessly […]