Articles

Upcoming Cybertalks

Effective SOC Management and Incident Response 

Date: June 21, 2023 Time: 8:30 AM MDT | 8:00 PM IST | 9:30 AM CDT Topic: Effective SOC Management and Incident Response Register Abstract: As organizations adopted remote work models and migrated over to the cloud, there has been an addition of newer attack surfaces, making global infrastructures even more vulnerable. Security Operations Center…

Read article
Psychology of Human Behavior in Threat Compliance
The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths

Date: June 13, 2023Time: 3:00 PM BST, 6:00 PM AST, 7:30 PM ISTTopic: The Role of Humans in Cybersecurity: Transforming Vulnerabilities into Strengths Register Abstract: In 2022, according to the Verizon Data Breach Investigations Report, 82% of data breaches involved human error. Nevertheless, the investment in remediating this threat vector has been abysmal with regard…

Read article
Navigating the Changing Landscape of Information Security Leadership: Best Practices

Date: June 15, 2023 Time: 4:00 PM CEST | 7:30 PM IST | 8:00 AM MDT | 3:00 PM BST | 10:00 AM EDT Topic: Navigating the Changing Landscape of Information Security Leadership: Best Practices Register Abstract: The ever-evolving landscape of information security leadership has become increasingly complex, with emerging technologies, regulatory requirements, and threat…

Read article
Ethical-Hacking
Why You Should Learn Ethical Hacking, Network Security, Digital Forensics, and SOC for a Perfect Launch Pad into Cybersecurity

Date: April 5, 2023Time: 7:00 PM IST | 3:30 PM CEST | 2:30 PM BST | 5:30 PM GSTTopic: Why You Should Learn Ethical Hacking, Network Security, Digital Forensics, and SOC for a Perfect Launch Pad into Cybersecurity Register Abstract: Cybersecurity is classified across various fields based on the function, scope of operation, and outcome…

Read article
Key-to-Zero-trust-ECCU
Identity-Driven Security: The Key to Zero Trust

Date: April 19, 2023Time: 9:00 AM EDT | 3:00 PM CEST | 6:30 PM ISTTopic: Identity-Driven Security: The Key to Zero Trust Register Abstract: Zero Trust, a threat monitoring approach, has moved to the forefront of information security in the last two years, transforming how enterprise security architectures are designed, deployed, and measured. Zero Trust…

Read article
Cloud Security: Avoiding Misconceptions and Employing Security Best Practices

Date: July 31, 2023 Time: 9:30 PM AEST |  5:00 PM IST | 12:30 PM BST Topic: Cloud Security: Avoiding Misconceptions and Employing Security Best Practices Register Abstract: Organizations moving to the cloud or subscribing to products that provide SaaS-based offerings tends to complicate the responsibilities of the service providers and the users. The common…

Read article