This is a event spanned across the month of October 2021 with 90 minute event sessions on each day,
most weekdays every week.
Session start time is always at 11 AM EST / 4 PM BST / 8 AM PST / 10 AM CST / 08:30 PM IST
Join here on airmeet platform
I will be talking about how to approach every minute details in Cybersecurity with the right mindset. Because Cybersecurity is a huge umbrella and learning is the only way out to grow continuously else one becomes a dinosaur with technology dynamics constantly evolving.
My talk will be about how to stay on track and how to keep evolving with everything in the fast paced world of Cybersecurity.
Why did I choose to become an entrepreneur Establishing a value system/company culture How to start-up Success Criteria Establishing Brand
I will talk about challenges people are facing in digital transformation world. Importance/needs of digital transformation process. And various ways to make a transformation secure.
What are the different aspects of moving to cloud for enterprise and how to approach its security risk management
What is OWASP? What its mission? Who can join and all other questions you may have will get answered.
UNpkl is addressing two major challenges customers are urgently facing today: increased and more sophisticated cyber attacks and uncontrollable data privacy. More and more organizations are experiencing a spike in the volume of attacks during the pandemic and remote workers are at risk without central IT protection. IT departments are scrambling to protect their employees in the new norm of remote working and learning. Study also shows that due to economic challenges caused by the pandemic, fewer organizations expect to increase human resources dedicated to cybersecurity. These new trends which emerged during the pandemic and are likely to last post pandemic call for new ways and new tools to protect company assets and employees from cyber attacks. UNpkl solution detects cyber threat real-time, arms users of all profiles with the right tool to protect themselves and puts security on auto-pilot. Network data privacy has always been a long-standing controversy without effective solutions. Customers' personal data goes to various web services and customers have no control, nor understanding of where their data is being sent to. UNpkl provides visibility into customers' network and shows exactly where their data is being sent to. With UNpkl insight and analytics, customers have 100% understanding of their network usage, controls where their data goes and can customize their usage report to understand what matters the most for their businesses.
Application Security is an old field, almost as old as the security industry itself. Over the years, security researchers and professionals have consolidated the knowledge of various issues with respect to application security into databases.
This consolidation allows us to study these issues, classify them and create standards around them. In current times, technology is moving forward at a blazing fast pace and the traditional way of doing Application Security is not going to keep up. To compensate for this, we can utilise automated processes to help us in securing our applications.
This talk will focus on how we can utilise our collective security knowledge and create automation for implementing security processes with a demonstration. This talk would be beneficial for all audiences, especially for the ones who have just begun embracing automation in their organisation.
Zero Trust Framework, and the 5 must-have tool types: 1. Strong authentication. Ensure strong multi-factor authentication and session risk detection as the backbone of your access strategy to minimize the risk of identity compromise. 2. Policy-based adaptive access. Define acceptable access policies for your resources and enforce them with a consistent security policy engine that provides both governance and insight into variances. 3. Micro-segmentation. Move beyond the simple centralized network-based perimeter to comprehensive and distributed segmentation using software-defined micro-perimeters. 4. Automation. Invest in automated alerting and remediation to reduce your mean time to respond (MTTR) to attacks. 5. Intelligence and AI. Utilize cloud intelligence and all available signals to detect and respond to access anomalies in real-time.
Modern trends in Ransomware attacks & how to stay safe.
Financial Industry is plagued with different kinds of cyberattacks ranging from credential stuffing, business email compromise, data breaches and supply chain attacks.
This talk will focus on developing a holistic approach towards building security into the banking products.
Security compromises and breaches are as certain as life and taxes. However, 85% of the breaches can be traced back to deficiencies in three main control groups. Let us discuss the main categories of breaches and controls to prevent them.
Source: Verizon DBIR 2021
I will talk about what is ransomware, how it can infect our infrastructure/Machines, what to do if you are undergoing a ransomware attack, how you can be secure from this personally, and where you can found a ransomware decryptor.
Sock puppet accounts are alternative accounts often created on social platforms in order to either collect or disperse information. They are most widely known as “fake accounts” or “troll accounts” used to spread propaganda. Although there are many uses of sock puppet accounts, there are two uses that will be covered: - For active reconnaissance/human intelligence - For passive reconnaissance/open source intelligence In this presentation, Mariel Klosterman will cover: - What sock puppet accounts are - Two main uses of sock puppet accounts - How they can be used against you
Follow & Watch live on Social Media. Subscribe to our newsletter to get the latest news