Technical

Streamlining Compliance

In this session, we will explore how to effectively streamline compliance by navigating the complexities of IT Policy, Security Design Review (SDR), and the Waiver Process Workflow. Attendees will learn about the key steps involved in each process, best practices for achieving compliance with minimal friction, and how to efficiently manage exceptions through waivers. This presentation aims to simplify these essential components, helping teams ensure alignment with IT governance while optimizing operational efficiency.

 

Cloud Range - Anatomy of Attack - Ransomware

 

Description

Join us for an engaging "Anatomy of an Attack" discussion where we'll dive into the world of ransomware! You'll learn the ins and outs of ransomware, from how it sneaks into your system and locks up your precious data, to the reasons people end up paying the ransom. We'll cover its shady history, the current threats lurking out there, and, most importantly, how to protect yourself. Plus, witness a live demonstration of a ransomware attack in action—without the real-life panic, of course!

 

Carlos De Leon: Digital Danger Zone - Unmasking Ransomware and Malware Threats

 

Description

"Digital Danger Zone: Unmasking Ransomware and Malware Threats" is a comprehensive exploration of the evolving landscape of cybersecurity threats facing organizations and individuals in today's interconnected world. This talk delves into the intricate workings of ransomware and malware, two of the most prevalent and destructive forms of cyber attacks.

 

Senthil Masilamani: Securing the Future-Integrating Cybersecurity in Cloud and Hybrid Environments

 

Description

This presentation focuses on the challenges and strategies of maintaining robust cybersecurity measures across a diverse range of technologies, including cloud and hybrid environments, which are becoming increasingly common in today's IT landscape. It highlights the importance of leadership in ensuring security is a priority in these complex and varied technology setups.

Alex Salazar: TL;DR on Top-Level Domains and Phishing Campaigns

 

Description

Join Alex Salazar, Cybersecurity Advisor with CISA, as he discusses what Top-Level Domains are and how to spot scam and phishing pages. Alex will go over examples he has seen in the field of successful phishing attacks that have led to the deployment of ransomware in organization. Alex will also cover how AI may influence phishing in the future. Most importantly, he will discuss what you can do to protect yourself and your organization.

Cory Williams: NCSR - A Quick Guide Through the Maturity Levels

 

Description

In this introductory course on the NCSR maturity levels, we’ll explore the stages of cybersecurity maturity through a fun and relatable analogy: building a cake. Starting with basic ingredients to more complex layers, we'll break down each maturity level and how it represents the development of a stronger cybersecurity framework. Cory will be guiding you through the process step by step, using the cake-building metaphor to make the concepts easier to digest and apply in real-world scenarios.