Does Remote Work Present a Major Cybersecurity Threat?
Date: June 29, 2022 Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. IST Topic: : Does Remote Work Present a Major Cybersecurity Threat? Abstract: Not everyone has the cybersecurity skills or awareness to stay safe on the internet, where hackers often use sophisticated tactics to prey on unsuspecting users. This is especially problematic for employees who […]
Network Security Essentials: Attacks and Defense Strategies
Date: June 23, 2022 Time: 10 a.m. EDT/11 a.m. BRT/7:30 p.m. IST Topic: : Network Security Essentials: Attacks and Defense Strategies Abstract: Network security encompasses all physical and virtual assets that enable data transmission between nodes or endpoints. As a result, network defense is a broad and crucial cybersecurity function that covers a wide range […]
The Dos and Don’ts of API Security
Date: June 22, 2022 Time: 9 a.m. MDT/4 p.m. BST/8:30 p.m. IST Topic: : The Dos and Don’ts of API Security Abstract: Cybercrime is on the rise, and no technology is immune to attacks by malicious actors. Application programming interfaces (APIs) are becoming more prevalent in cloud computing, the Internet of Things, and mobile applications, […]
Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments
Date: May 27, 2022 Time: 10 a.m. EDT/3 p.m. BST/7:30 p.m. IST Topic: Cyberthreat Hunting and Intelligence in Internet of Things (IoT) Environments Abstract: Cybersecurity is a never-ending fight. As security professionals develop advanced strategies to stop one attack, malicious hackers invent more sophisticated tactics for penetrating networks and covertly stealing confidential data. Cyberthreat […]
Threat Intelligence: Moving Towards Cyber Resilience in 2022
Date: May 19, 2022 Time: 9 a.m. CDT/5 p.m. EAT/7:30 p.m. IST Topic: Threat Intelligence: Moving Towards Cyber Resilience in 2022 Abstract: The COVID-19 pandemic forced businesses to accelerate their adoption of digital technologies, paving the way for malicious actors to target the critical IT infrastructures of enterprises, government, and healthcare providers. The ever-evolving […]