Blockchain and Identity Management: Building Trust in a Digital World
Date: May 27, 2024 Time: 2:30 PM BST | 9:30 AM EDT | 7:00 PM IST Topic: Blockchain and Identity Management: Building Trust in a Digital World Abstract: In today’s interconnected digital landscape, ensuring security based on user behavior, identity, and access management has become significant. However, traditional identity management systems and networks are often […]
A Guide to Incident Response Framework: Data Mining and Managed Review
Date: May 23, 2024 Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST Topic: A Guide to Incident Response Framework: Data Mining and Managed Review Abstract: This final session of the Incident Response Framework series highlights a less forensics-focused topic within the realm of incident response that is nonetheless critical to the […]
DevSecOps: Bridging the Gap Between Development, Security, and Operations
Date: May 21, 2024 Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST Topic: DevSecOps: Bridging the Gap Between Development, Security, and Operations Abstract: In the current digital landscape, increasing reliance on applications has expanded the threat landscape, thus increasing the risk of cybersecurity breaches. DevSecOps emerges as a response to application […]
Harnessing Risk Analysis Capabilities to Drive Business Resilience
Date: May 14, 2024 Time: 4:30 PM GMT+3 | 9:30 AM EDT | 7:00 PM IST Topic: Harnessing Risk Analysis Capabilities to Drive Business Resilience Abstract: Managing and mitigating threats in the current security landscape demands insights into real-time and continuous risk analysis capabilities. Leveraging these capabilities is pivotal in bolstering threat resilience and security […]
Charting the Course: A CISO’s Guide to Success in Cybersecurity
Date: April 30, 2024 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: Charting the Course: A CISO’s Guide to Success in Cybersecurity Abstract: Chief Information Security Officers (CISOs) play a crucial role in safeguarding an organization’s security architecture while navigating the complicated landscapes of threats, regulations, and emerging technologies. Success […]