Articles

Recent Cybertalks

THE RISE, DEATH AND RESURRECTION OF RANSOMWARE
The Rise, Death and Resurrection of Ransomware

Name: Raj Samani and Lee MunsonDesignation: Chief Scientist, McAFee and Senior Technical Writer, McAFeeTopic: The Rise, Death and Resurrection of RansomwareDate of Webinar: 29th May, 2019Time and Location: 9am EST / 6:30pm IST/ 1pm GMT Watch Now       Speaker Bio:Raj Samani: Raj Samani is a computer security expert working as the Chief Scientist,…

Read article
LEARN THE 5 PHASES OF ETHICAL HACKING
Learn the 5 Phases of Ethical Hacking

Name: Tom Brett Designation: Training Portfolio Manager-BSI Cybersecurity and Information Resilience Topic: Learn the 5 Phases of Ethical Hacking Date of Webinar: 7th May, 2019 Time and Location: 3pm IST/ 9:30am GMT/ 6:00pm SGT Watch Now Speaker Bio: Tom is an experienced trainer and consultant with over 25 years working in the IT industry in…

Read article
UNDERSTANDING THE WHITE HAT HACKER AND CAREER PROSPECTS
Understanding the White Hat Hacker and Career Prospects

Name: Kris Seeburn Designation: Chief Instructor – Cybersecurity, Professor – Cyberwarfare – National Defence University, Dept. of Justice, FBI Topic: Understanding the White Hat Hacker and Career Prospects Date of Webinar: 2nd May, 2019 Time and Location: 9am EST/ 6:30pm IST/ 2pm GMT Watch Now Speaker Bio: IT/Cyber Security professional with over 16 years of…

Read article
Cybersecurity and theHacking Paradigm

Name: Chanel Suggs, Duchess of Cybersecurity® Topic: Cybersecurity and the hacking paradigm Date of Webinar: 18th April, 2019 Time and Location: 10:00 am EST/ 7:30pm IST/ 3pm GMT Watch Now Speaker Bio: Dr. Chanel Suggs (Duchess of Cybersecurity ®) is the Founder and CEO of Wyvern Security. She is a subject matter expert in Cyber…

Read article
A CHALLENGE TO BUSINESS LEADERS: RETHINKING YOUR DEFENSE STRATEGY TO COUNTER EVER-EVOLVING THREATS
A Challenge to Business Leaders: Rethinking Your Defense Strategy to Counter Ever-evolving Threats

Name: Quan Heng Lim, Designation: Chief of Staff to the CTO, Horangi Topic: A challenge to business leaders- Rethinking your defense strategy to counter ever evolving threats Date of Webinar: 12th April, 2019 Time and Location: 5:30pm SGT/3:00pm IST/ 10:30am GMT Watch Now   Speaker Bio: Q works with the technology teams and other business…

Read article
HOW NOT TO BE A PENETRATION TESTER
How Not to Be a Penetration Tester?

Name: Alaa Bahrani, Regional Cyber Security Leader at GE Topic: How not to be a penetration tester? Date of Webinar: 4th April, 2019 Time and Location: 12:30 pm Bahrain Time/ 3pm IST/ 5:30pm SGT Watch Now Speaker Bio: Alaa Bahrani is a Regional Cyber Security Leader at GE with 14 years of experience in the…

Read article
COUNTERING TARGETED ATTACKS: APT DEFENSE
Countering Targeted Attacks: APT Defense

Name: Richard Stiennon, Author and Industry Analyst Topic: Countering Targeted Attacks: APT Defense Date of Webinar: 4th April, 2019 Time and Location: 11am EST/8:30 IST/4pm GMT Watch Now Speaker Bio: Richard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005, to cover the 2,200 vendors that make up the IT security…

Read article
THE BIG SECURITY CHALLENGEa, TODAY
The Big Security Challenge, Today

Name: Sergio Pohlmann, VP of GTISUL Topic: The Big Security Challenge, Today Date of Webinar: 29th March, 2019 Time and Location: 6:30pm IST/ 1pm GMT Watch Now     Speaker Bio: Sergio Pohlmann is a Computer Engineer, Experienced in the IT area since the 80’s. He was a security consultant to various banks and business,…

Read article