Remove Information Security Remove Technology Remove Webinar
article thumbnail

Combined SOC Webinar Q&A: From EDR to ITDR and ASO … and ChatGPT

Anton on Security

In recent weeks, I did two fun webinars related to Security Operations, and there was a lot of fun Q&A. For extra fun, I had ChatGPT answer some of them, to see if it can replace me :-) So, first, ISACA webinar “Modernize Your SOC for the Future” focused on our Autonomic Security Operations vision. with the SOC?

article thumbnail

Get an Untrusted Security Advisor! Have Fun, Reduce Fail!

Anton on Security

Many organizations are looking for trusted advisors , and this applies to our beloved domain of cyber/information security. I plan to do X with Y and this affects security, is this a good idea? What security will actually be reduced if I implement this new control? Making “what if” scenarios is another good one.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List

Thales Cloud Protection & Licensing

The Most Popular Data Security Webinars of 2022: Sovereignty, Cloud Security and Compliance Top the List. Fasten your seatbelts and enjoy the Top 5 list of Thales webinars for 2022. Trends in Cloud Security: Key Findings from the 2022 Cloud Security Study. Thu, 01/12/2023 - 05:54.

article thumbnail

Disability Access Within the Field of Social Engineering

Security Through Education

Phones and computers allow us to transmit information globally. This is ALL adaptive technology! Sometimes the adaptive technology that one person needs differs from what another person needs. Information security has a lot of potential for remote positions and flexible work options.

article thumbnail

Protecting MSPs From Helpdesk Phishing

Duo's Security Blog

In recent webinar Preventing Helpdesk Phishing with Duo and Traceless , Duo PMM Katherine Yang sat down with Gene Reich, Co-founder of Traceless to discuss why stronger identity verification is critical for MSPs and helpdesk teamsespecially with the increased accessibility of AI technologies driving identity fraud.

Phishing 111
article thumbnail

Kickstart Your Cyber Career in 2023 with a Winning Cyber Resume (Webinar)

CyberSecurity Insiders

Join the live webinar “ How to Build Your Cyber Resume for Top Cyber Jobs in 2023 ” on Thursday January 12, 2023 @ 12:00p ET – presented by SCIPP International, in partnership with Old Dominion University. Mr. Chubbuck has over 25 years of Information Security and Technology experience.

article thumbnail

Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros

Security Boulevard

For more information about data security , check out these Tenable resources: The value of data security integrated into a unified cloud security strategy (infographic) Harden Your Cloud Security Posture by Protecting Your Cloud Data and AI Resources (blog) Know Your Exposure: Is Your Cloud Data Secure in the Age of AI? (on-demand