A Guide to Incident Response Framework: Ransomware Negotiations

Date: February 15, 2024 Time: 9:30 AM EST | 8:30 AM CST | 8:00 PM IST Topic: A Guide to Incident Response Framework: Ransomware Negotiations Abstract: This webinar session provides real-world-based training focused on the Incident Response (IR) forensics vendor’s viewpoint of interacting, negotiating, and settling with a ransomware threat actor. Including what role the […]
From Detection to Recovery: A Comprehensive Approach to Cyber Resilience

Date: February 9, 2024 Time: 3:30 PM CAT | 8:30 AM EST | 7:00 PM IST Topic: From Detection to Recovery: A Comprehensive Approach to Cyber Resilience Abstract: The present-day cybersecurity primarily focuses on developing cyber resilience for businesses, i.e., strengthening an organization’s ability to prepare, respond, and recover from cyberattacks. Detection is the first […]
Infinite Mindset vs. Finite Mindset in Cybersecurity

Date: February 8, 2024 Time: 3:30 PM CET | 9:30 AM EST | 8.00 PM IST Topic: Infinite Mindset vs. Finite Mindset in Cybersecurity Abstract: Cybercriminals persistently devise new methods to compromise network security and access sensitive information. With the surge in the quality and quantity of cybercrimes, chief information security officers (CISOs) and security […]
Cybersecurity Career Roadmap: Building Your Path in 2024

Date: January 24, 2024 Time: 8:00 AM CST | 3:00 PM CET | 7:30 PM IST Topic: Cybersecurity Career Roadmap: Building Your Path in 2024 Abstract: The need for qualified cybersecurity workers is continuously growing as we approach 2024 due to the increasing dependence on technology and the shifting cybersecurity landscape. To navigate this dynamic […]
Bad, Good, and Best Password Practices: Preventing Dictionary-Based Attacks – Part 2

Date: January 19, 2024 Time: 1:30 PM WET | 8:30 AM EST |7:00 PM IST Topic: Bad, Good, and Best Password Practices: Preventing Dictionary-Based Attacks – Part 2 Abstract: Dictionary-based attacks pose a persistent threat in the digital realm, persisting as long as there is a need for more emphasis on secure password practices and […]