Ethical Hacking: Emerging Technologies that Require Red Teamers

  Date: April 29, 2022 Time: 9:30 a.m. MDT/11:30 a.m. EDT/4:30 p.m. BST/9 p.m. IST Topic: Ethical Hacking: Emerging Technologies that Require Red Teamers Abstract: Thanks to emerging technologies like cloud computing, the Internet of Things, and blockchain, businesses have become more cost effective and efficient. However, these developments have also created new attack surfaces…

Oriyomi Fowler

Skills, Trends, and Challenges in Modern Network Defense

  Date: April 14, 2022 Time: 11:30 a.m. EDT/4:30 p.m. BST/9 p.m. IST Topic: Skills, Trends, and Challenges in Modern Network Defense Abstract: Emerging technologies are transforming global network security environments and perimeter security. Advancements in cloud computing and storage, the Internet of Things, and remote access have challenged IT professionals to implement innovative and…

How addressing cybersecurity vulnerabilities can strengthen defenses

Why Addressing Cybersecurity Vulnerabilities Is a Top Priority

  Date: April 12, 2022 Time: 8 a.m. EDT/1 p.m. BST/5:30 p.m. IST Topic: Why Addressing Cybersecurity Vulnerabilities Is a Top Priority Abstract: All businesses need to be vigilant in protecting themselves against cybersecurity risks and vulnerabilities—though considering the ever-expanding list of cybersecurity vulnerabilities, enterprises may sometimes feel as if they are waging a losing…

Satyavathi Divadari

Cloud Security: Best Practices for Securing Cloud Environments

  Date: March 1, 2022 Time: 8.00 a.m. EST / 1.00 P.M. GMT / 6:30 p.m. IST Topic: Cloud Security: Best Practices for Securing Cloud Environments Abstract: Businesses are rapidly adopting cloud infrastructures for information storage and business operations. Cloud environments enable seamless data exchange, boost productivity, are reliable, and reduce operational and overhead costs.…

How Can Continuous Automated Red Teaming Provide Scalability and Better Insights?

  Date: February 24, 2022 Time: 7.30 p.m IST Topic: How Can Continuous Automated Red Teaming Provide Scalability and Better Insights? Abstract: With the emergence of such concerns as new attack vectors, advanced technologies, and rapid digitization, the cyberthreat landscape is rapidly evolving. Organizations need to identify their attack surfaces to mitigate cyber risks and…