Articles

Recent Cybertalks

The Benefits of Creating Your Own Hacking Lab

Name: Austin Norby Designation: Director of Cyber Initiatives, Organization: Blue Star Software | Cyber Topic: The Benefits of Creating Your Own Hacking Lab Date of Webinar: 12th September, 2019 Time and Location: 11am EST/ 8:30pm IST/ 4pm GMT [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Watch Now[/su_button] [su_spacer size=”20″ class=””]…

Read article
Third Party Technology Risk Management

Name: Thomas Fertal Designation: Technology Risk & Information Security Manager Organization: Cyber Governance Consulting LLC Topic: Third Party Technology Risk Management Date of Webinar: 28th August, 2019 Time and Location: 12pm EST/ 9:30pm IST/ 5pm GMT [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Register Now[/su_button] [su_spacer size=”20″ class=””] Speaker Bio:…

Read article
CISO in Action: Building a Global Information Security Program

Name: Dr Asaad Moosa Designation: CISO Organization: British Forces Broadcasting Service Topic: CISO in Action: Building a Global Information Security Program Date of Webinar: 27th August, 2019 Time and Location: 3pm BST/ 7:30pm IST/ 10am EST [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Watch Now[/su_button] [su_spacer size=”20″ class=””] Speaker Bio:…

Read article
The “S” in IoT is for Security

Name: Derek Fisher Designation: Security leader, speaker, and instructor Organization: Securely Built LLC Topic: The ‘S’ in IoT is for Security Date of Webinar: 22nd August, 2019 Time and Location: 12pm EST/ 9:30pm IST/ 5pm GMT [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Watch Now[/su_button] [su_spacer size=”20″ class=””] Speaker Bio:…

Read article
How to Solve the Top 3 Struggles with Identity Governance and Administration

Speakers: Bill Glynn, Security Product Manager, Core Security Mike Lynch, Senior Sales Engineer, Core Security Topic: How to Solve the Top 3 Struggles with Identity Governance and Administration Date of Webinar: 14th Aug, 2019 Time and Location: 10am CST/ 8:30pm IST/ 4pm GMT [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″…

Read article
Security Awareness Training…That Actually Works.

Name: Aaron Birnbaum Designation: Founder and Chief Security Officer Organization: Seron Security Topic: Security Awareness Training…That Actually Works. Date of Webinar: 31st July, 2019 Time and Location: 9:00 am EST/ 6:30 pm IST / 2:00 pm GMT [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Watch Now[/su_button] [su_spacer size=”20″ class=””] Speaker…

Read article
Exploiting and Augmenting Threat Intel in SOC Operations

Name: Vijay Verma Designation: VP & Head, Cyber Security Operations Center (CSOC) Organization: Reliance Jio Topic: Exploiting and Augmenting Threat Intel in SOC Operations Date of Webinar: 30th July, 2019 Time and Location: 2:30 pm IST/ 5:00 pm SGT/ 9:00 am GMT [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Watch…

Read article
Identity is Today’s Firewall and a Critical Component of Cybersecurity

Name: Michael Brengs Designation: CRO & Managing Partner Organization: Optimal IdM Topic: Identity is Today’s Firewall and a Critical Component of Cybersecurity Date of Webinar: 24th July, 2019 Time and Location: 9am EST/ 6:30pm IST/ 2pm GMT [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Watch Now[/su_button] [su_spacer size=”20″ class=””] Speaker…

Read article
How to Protect 30Bn IoT devices by 2020

Name: Romeo Siquijor Designation: IT Director/Chief Information Technology Business Partner Organization: CEMEX USA Topic: How to Protect 30Bn IoT devices by 2020 Date of Webinar: 16th July, 2019 Time and Location: 12:00 pm EST/ 5:00 pm GMT/ 9:30 pm IST [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Watch Now[/su_button] [su_spacer…

Read article
They’re Too Big to Fail. Are You Too Small to Recover?

Name: Tim Foley Designation: Director of Information Security Organization: Dataprise CYBER division Topic: They’re Too Big to Fail. Are You Too Small to Recover? Date of Webinar: 10th July, 2019 Time and Location: 10:00 am EST/ 7:30 pm IST/ 3:00 pm GMT [su_button url=”#register” style=”flat” background=”#a51c30″ color=”#ffffff” size=”5″ center=”no” radius=”0″ text_shadow=”0px 0px 0px #000000″ class=”alignleft”]Watch…

Read article