Schedule

This is a event spanned across the month of October 2021 with 90 minute event sessions on each day,
most weekdays every week. Session start time is always at 11 AM EST / 4 PM BST / 8 AM PST / 10 AM CST / 08:30 PM IST
Join here on airmeet platform


Week 1: Oct 01- Oct 8
Week 2: Oct 11- Oct 15
Week 3: Oct 18 - Oct 22
Week 4: Oct 25- Oct 29

Day 17, Monday, Oct 25

The Cybersecurity Mindset: A ceaseless erudition

I will be talking about how to approach every minute details in Cybersecurity with the right mindset. Because Cybersecurity is a huge umbrella and learning is the only way out to grow continuously else one becomes a dinosaur with technology dynamics constantly evolving.
My talk will be about how to stay on track and how to keep evolving with everything in the fast paced world of Cybersecurity.

Bishakha Jain
Senior Consultant at IBM
Founder Talks

Why did I choose to become an entrepreneur Establishing a value system/company culture How to start-up Success Criteria Establishing Brand

Securing Digital Transformation

I will talk about challenges people are facing in digital transformation world. Importance/needs of digital transformation process. And various ways to make a transformation secure.

Day 18, Tuesday, Oct 26

Cloud Security Challenges

What are the different aspects of moving to cloud for enterprise and how to approach its security risk management

Dhaval Shah
Director, CISO, Co-founder at Rainbow Secure
Introduction to OWASP and Women in AppSec Sub-chapter

What is OWASP? What its mission? Who can join and all other questions you may have will get answered.

Zoe Braiterman
Security Consultant
Founder Talk

UNpkl is addressing two major challenges customers are urgently facing today: increased and more sophisticated cyber attacks and uncontrollable data privacy. More and more organizations are experiencing a spike in the volume of attacks during the pandemic and remote workers are at risk without central IT protection. IT departments are scrambling to protect their employees in the new norm of remote working and learning. Study also shows that due to economic challenges caused by the pandemic, fewer organizations expect to increase human resources dedicated to cybersecurity. These new trends which emerged during the pandemic and are likely to last post pandemic call for new ways and new tools to protect company assets and employees from cyber attacks. UNpkl solution detects cyber threat real-time, arms users of all profiles with the right tool to protect themselves and puts security on auto-pilot. Network data privacy has always been a long-standing controversy without effective solutions. Customers' personal data goes to various web services and customers have no control, nor understanding of where their data is being sent to. UNpkl provides visibility into customers' network and shows exactly where their data is being sent to. With UNpkl insight and analytics, customers have 100% understanding of their network usage, controls where their data goes and can customize their usage report to understand what matters the most for their businesses.

Yuan Karppanen

President/CEO at UNpkl, Product Manager - Azure Active Directory at Microsoft

Day 19, Wednesday, Oct 27

Staying secure on a budget

Application Security is an old field, almost as old as the security industry itself. Over the years, security researchers and professionals have consolidated the knowledge of various issues with respect to application security into databases.
This consolidation allows us to study these issues, classify them and create standards around them. In current times, technology is moving forward at a blazing fast pace and the traditional way of doing Application Security is not going to keep up. To compensate for this, we can utilise automated processes to help us in securing our applications.
This talk will focus on how we can utilise our collective security knowledge and create automation for implementing security processes with a demonstration. This talk would be beneficial for all audiences, especially for the ones who have just begun embracing automation in their organisation.

Ayush Priya
Cloud Security Specialist at at Kloudle | OWASP Chapter Lead
Zero-trust Security Principles

Zero Trust Framework, and the 5 must-have tool types: 1. Strong authentication. Ensure strong multi-factor authentication and session risk detection as the backbone of your access strategy to minimize the risk of identity compromise. 2. Policy-based adaptive access. Define acceptable access policies for your resources and enforce them with a consistent security policy engine that provides both governance and insight into variances. 3. Micro-segmentation. Move beyond the simple centralized network-based perimeter to comprehensive and distributed segmentation using software-defined micro-perimeters. 4. Automation. Invest in automated alerting and remediation to reduce your mean time to respond (MTTR) to attacks.  5. Intelligence and AI. Utilize cloud intelligence and all available signals to detect and respond to access anomalies in real-time.

Madinah Ali

President/CEO SafePC Cloud
Ransomware & its flavors, tips & tools to fight back

Modern trends in Ransomware attacks & how to stay safe.

Tanya Srivastava
Co-Lead of Content Team and Editor at Cyversity

Day 20, Thursday, Oct 28

Security Considerations in Fintech

Financial Industry is plagued with different kinds of cyberattacks ranging from credential stuffing, business email compromise, data breaches and supply chain attacks.
This talk will focus on developing a holistic approach towards building security into the banking products.

Sarba Roy
Product Security Consultant at Umpqua Bank
Life, Death, Taxes & Breaches

Security compromises and breaches are as certain as life and taxes. However, 85% of the breaches can be traced back to deficiencies in three main control groups. Let us discuss the main categories of breaches and controls to prevent them.
Source: Verizon DBIR 2021

Niloufer Tamboly
Security Researcher, Co-founder at Step up Skills
Ransomware & its flavors, tips & tools to fight back

I will talk about what is ransomware, how it can infect our infrastructure/Machines, what to do if you are undergoing a ransomware attack, how you can be secure from this personally, and where you can found a ransomware decryptor.

Yuvank Soni
Information Security Consultant at KLEAP Technologies
Student paper on Sock puppet Accounts

Sock puppet accounts are alternative accounts often created on social platforms in order to either collect or disperse information. They are most widely known as “fake accounts” or “troll accounts” used to spread propaganda. Although there are many uses of sock puppet accounts, there are two uses that will be covered: - For active reconnaissance/human intelligence - For passive reconnaissance/open source intelligence In this presentation, Mariel Klosterman will cover: - What sock puppet accounts are - Two main uses of sock puppet accounts - How they can be used against you

Day 21, Friday, Oct 29

Rainbow Secure Insights

Brief introduction about Rainbow Secure's Current and Future plans

Get your spot Now!

Register Now

Stay Informed

Follow & Watch live on Social Media. Subscribe to our newsletter to get the latest news

Subscribe to Newsletter