Threat Intel Analysis and Its Influences on Hunt Team Operations and SOAR

Threat Intelligence

Date: September 8, 2023 Time: 8:30 AM MDT | 9:30 AM CDT | 8:00 PM IST Topic: Threat Intel Analysis and its Influences on Hunt Team Operations and SOAR Abstract: Threat hunting helps locate gaps in detection, discover new threats and TTPs, etc., that could add to the threat intelligence process and analysis. This webinar […]

Integrating Security into the CI/CD Pipeline

DevSecOps

Date: September 7, 2023 Time: 2:00 PM WAT | 7:00 PM MDT | 3:00 PM CEST | 6:30 PM IST Topic: Integrating Security into the CI/CD Pipeline Abstract: The CI/CD pipeline plays a crucial role in streamlining and automating various stages of application development, such as compiling, testing, analysis, security, deployment, and packaging. However, this […]

Career Tips for a Successful Cyber Security Transition

career tips

Date: August 28, 2023 Time: 9:00 PM CDT / 10:00 AM EDT/ 7:30 PM IST Topic: Career Tips for a Successful Cyber Security Transition Abstract: Are you looking to switch careers and break into cyber security? Transitioning to cyber security involves many factors. In this webinar, you will learn more about cyber security career opportunities, […]

Navigating the Changing Landscape of Information Security Leadership: Best Practices

Navigating the Changing Landscape of Information Security Leadership Best Practices banner

Date: August 24, 2023 Time: 4:00 PM CEST | 7:30 PM IST | 8:00 AM MDT | 3:00 PM BST | 10:00 AM EDT Topic: Navigating the Changing Landscape of Information Security Leadership: Best Practices Abstract: The ever-evolving landscape of information security leadership has become increasingly complex, with emerging technologies, regulatory requirements, and threat actors. […]

Navigating the Cyber Battlefield: Leveraging MITRE ATT&CK Tactics and Techniques

MITRE

Date: August 21, 2023 Time: 2:30 PM WEST | 9:30 AM EDT | 3:30 PM CEST | 7:00 PM IST Topic: Navigating the Cyber Battlefield: Leveraging MITRE ATT&CK Tactics and Techniques Abstract: The current threat landscape necessitates organizations to proactively detect and remediate vulnerabilities before attackers discover and exploit them. As the threat landscape continues […]