Leveraging Threat Intelligence for Security: A Beginner’s Guide

Date: June 18, 2024 Time: 7:00 AM PDT | 10:00 AM EDT | 7:30 PM IST Topic: Leveraging Threat Intelligence for Security: A Beginner’s Guide Abstract: In the current threat landscape, threat intelligence is a crucial tool against evolving risks. Leveraging threat intelligence involves gathering security intelligence from various sources, including open-source feeds to commercial […]
The Human Element: Understanding Social Engineering Tactics

Date: May 28, 2024 Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST Topic: The Human Element: Understanding Social Engineering Tactics Abstract: In today’s dynamic threat landscape, the one constant element persistently targeted is the human link, often because it is the weakest link in the security chain. Attackers constantly and relentlessly […]
Blockchain and Identity Management: Building Trust in a Digital World

Date: May 27, 2024 Time: 2:30 PM BST | 9:30 AM EDT | 7:00 PM IST Topic: Blockchain and Identity Management: Building Trust in a Digital World Abstract: In today’s interconnected digital landscape, ensuring security based on user behavior, identity, and access management has become significant. However, traditional identity management systems and networks are often […]
A Guide to Incident Response Framework: Data Mining and Managed Review

Date: May 23, 2024 Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST Topic: A Guide to Incident Response Framework: Data Mining and Managed Review Abstract: This final session of the Incident Response Framework series highlights a less forensics-focused topic within the realm of incident response that is nonetheless critical to the […]
DevSecOps: Bridging the Gap Between Development, Security, and Operations

Date: May 21, 2024 Time: 3:30 PM CEST | 9:30 AM EDT | 7:00 PM IST Topic: DevSecOps: Bridging the Gap Between Development, Security, and Operations Abstract: In the current digital landscape, increasing reliance on applications has expanded the threat landscape, thus increasing the risk of cybersecurity breaches. DevSecOps emerges as a response to application […]