Security Contextualization – Combating Risk with Actionable Data

Name: Steve Tcherchian Designation: Chief Product Officer and CISO, XYPRO Technology Topic: Security Contextualization – Combating Risk with Actionable Data Date of Webinar: 20th May, 2019 Time and Location: 8:00 am PST/8:30 pm IST/ 5 pm GMT Speaker Bio: Steve Tcherchian, CISSP, PCI-ISA, PCIP is the Chief Product Officer and CISO for XYPRO Technology. Steve…

cyber talks

Understanding the White hat hacker and career prospects

Name: Kris Seeburn Designation: Chief Instructor – Cybersecurity, Professor – Cyberwarfare – National Defence University, Dept. of Justice, FBI Topic: Understanding the White hat hacker and career prospects Date of Webinar: 2nd May, 2019 Time and Location: 9am EST/ 6:30pm IST/ 2pm GMT Speaker Bio: IT/Cyber Security professional with over 16 years of experience in…

Plan-a-Career-as-an-Enterprise-Security-Architect

Your Next Move to Creating a Cyber Safe Organization: Incident Handling

No matter how good the information security practices are in your organization, attackers are more sophisticated than that, especially with the release of new techniques and tools. For this reason, periodical assessment and continuous improvement of the security processes is very important. It is not just the pre-breach security measures that ensure the overall safety…

cyber talks

Creating a threat intelligence function that provides measurable value

Name: Chris Williams, VP, Cyber Threat Intelligence at Worldpay Topic: Creating a threat intelligence function that provides measurable value Date of Webinar: 24th April, 2019 Time and Location: 7am MST/ 6:30pm IST/ 2pm GMT Speaker Bio: Chris Williams is a cybersecurity professional with over 18 years at the federal and corporate level and has extensive…

The-Rise-and-Rise-of-Cybersecurity

The Rise and Rise of Cybersecurity

We are living in a technically-advanced world where so many things are automated and driven by artificial intelligence. The rise in technology has been accompanied by a rise in cybercrime. On one side, you have ‘script kiddies’ who release ransomware with minimal thought or effort, and on the other side, there are ‘state-backed’ hackers, who…

the-US-Department-of-Defense

EC-Council’s C|CISO and C|HFI Programs approved as Baseline certifications for the US Department of Defense IA Workforce under DoD 8140

EC-Council announces the official approval of both the Certified Chief Information Security Officer (CCISO) and the Computer Hacking Forensic Investigator (CHFI) programs as new baseline skill certification options for the U.S. Department of Defense (DoD) cyber workforce in several categories. Specifically, the CCISO program is a recognized certification for the DoD IAM Level II, IAM…