Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business

Name: Majed Alshodari, Head of Information Security Department Topic: Developing A Corporate Information Security Strategy and Roadmap that Aligned with Business Date of Webinar: 14th August 2018 Time and Location: 12 PM AST(Arabian Standard Time)/ 9:00 AM GMT/ 2:30 PM IST Speaker Bio: Eng. Majed Mohammad Alshodari is finalist for the 2018 CISO […]
Token Sale Economics: The Evolution of the ICO

Name: Sean Brizendine, Blockchain Advisor-Vegan Nation Topic: Token Sale Economics: The Evolution of the ICO Date of Webinar: 8th August 2018 Time and Location: 8PM Pacific Time/8:30 AM IST/11:AM SGT Topic Abstract: The ICO concept began as a Token Sale held by Mastercoin in July 2013. The total funds raised peaked at approximately […]
Foundation of Blockchain

Name: Nitin Gaur, Director – IBM Blockchain Labs Topic: Foundation of Blockchain Date of Webinar: 2nd August 2018 Time and Location: 8AM Central Time/1PM GMT/6:30PM IST Speaker Bio: Nitin Gaur, Director of IBM Blockchain Labs is renowned for his ability to analyse opportunities, anticipate trends, and create technologies that align with operational needs, catapult profitability, […]
Introduction to Application Security Automation

Name: Abhay Bhargav Topic: Introduction to Application Security Automation Date of Webinar: 25th July 2018 Time and Location: 8:00 PM Pacific Time Speaker Highlight: Abhay Bhargav is the CTO of we45, a focused Application Security company. Abhay is the author of two international publications. “Secure Java for Web Application Development” and “PCI Compliance: A Definitive […]
Invisible Threat on Server-less Architecture

Name: Faisal Yahya Topic: Invisible Threat on Serverless Architecture Date of Webinar: 18th July 2018 Time and Location: 4:00 PM, Jakarta Speaker Highlight: Faisal Yahya, is a Self-driven, forward-thinking, highly-versatile, innovative, hands-on Chief Information Officer with nearly 2 decades of progressive leadership in Software Development Life Cycle, IT Strategy, Enterprise Architecture, and Cybersecurity. He works […]