-
AI for Cybersecurity: discussing AI driven threats & solutions
-
Going Threat Hunting - getting your security strategy right
-
Zero-Trust security: from idea to real applications
-
Social Engineering, Phishing & Election security
-
Cloud Security - the importance of shared responsibility
-
Endpoint Security - Using advanced analytical techniques for endpoint device security
-
Strong Authentication - adaptive, continuous & intelligent
-
IoT & Critical Infrastructure Security - significance amid potential cyberwarfare
-
Role of Big Data in Cybersecurity: Challenges & Opportunities
-
Privileged Access Management - from planning to implementation
-
Cybersecurity Education & Talent Gap
-
Hacking Stories - overview of latest major cyber attacks