Demystifying AI: Understanding the Power and Limitations of Generative AI

Date: March 28, 2025 Time: 9:00 AM CDT | 10:00 AM EDT | 7:30 PM IST Topic: Demystifying AI: Understanding the Power and Limitations of Generative AI Abstract: AI is reshaping industries, yet misconceptions persist about its capabilities, risks, and ethical implications. In this talk, I will break down the fundamentals of AI and Generative AI, […]
Identity Lifecycle and Privileged Account Management

Date: April 11, 2025 Time: 8:30 AM CDT | 9:30 AM EDT | 7:00 PM IST Topic: Identity Lifecycle and Privileged Account Management Register Abstract: In the current threat landscape, where data breaches from both external and internal threat sources are rampant, identity and access management are crucial for preventing unauthorized access. As part of a […]
Hacking Payment Services: Real-World Business Logic Attack Scenarios

Date: April 15, 2025 Time: 4:30 PM EEST | 9:30 AM EDT | 7:00 PM IST Topic: Hacking Payment Services: Real-World Business Logic Attack Scenarios Register Abstract: This webinar offers an in-depth exploration of real-world business logic attacks that impact the banking and fintech sectors. It examines how legitimate functions can be exploited to perform malicious […]
Layer 7 DoS Attacks: Why Web Pages Remain Vulnerable Despite TLS 1.3 & QUIC

Date: April 17, 2025 Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST Topic: How Web Protocol Weaknesses Enable Layer 7 DoS Attacks Abstract:This webinar explores the inherent vulnerabilities within the design of web protocols that indirectly expose web pages to Layer 7 denial-of-service (DoS) attacks, regardless of the encryption protocol employed […]
Strategic Insights from a CISO: Career Insights and Strategic Decisions

Date: April 23, 2025 Time: 1:30 PM BST | 8:30 AM EDT | 6:00 PM IST Topic: Strategic Insights from a CISO: Career Insights and Strategic Decisions Register Abstract: As modern threats continue to evolve rapidly, the role of a Chief Information Security Officer (CISO) in protecting an organization’s information assets has never been more […]