Video
-
How Effective is the Legislative Role in Promoting Cyber Security?
A virtual panel hosted by the Shura Council of the State of Qatar, the Parliamentary Intelligence-Security Forum and Doha Forum…
Read More » -
Cloud Complexities: Navigating the Headwinds
From lambda functions and microservices to Kubernetes and machine learning: We have heard of devops and shifting left, S3 buckets,…
Read More » -
Training: Three Keys for Cloud Security Success
WhiteCome learn about three key items that determine cloud security success: identity, monitoring, and automation. Walk away with tips and…
Read More » -
Training: More Servers, More Problems: How Serverless Changes and Reduces Risk
Security professionals face the daunting challenge of keeping up with constantly changing technology trends. By the time security has a…
Read More » -
Training: Most Used AWS Services & How to Use Them Securely
Review of the top used AWS services and which security features you don’t want to forget about. Highlighting applicable CIS…
Read More » -
Online Safety and Security during COVID19
ITU and the office of the UN Under Secretary-General Fabrizio Hochschild co-organized a series of webinars on digital cooperation in…
Read More » -
Training: Cloud Security Monitoring and Threat Detection in AWS
In this talk, Shaun McCullough SANS Certified Instructor and author of the brand new class SEC541: Cloud Monitoring and Threat…
Read More » -
Training: Maturing your Threat Detection and Incident Response in AWS Cloud
To continuously mature your Threat Detection and Incident Response in AWS you need a well thought out strategy that aligns…
Read More » -
Training: Moving Operations to the Cloud
When an organization moves an application or service from one environment to another without stopping to redesign the application, this…
Read More » -
Training: Multicloud Security Assessment and Defense
Overview SEC510 provides cloud security practitioners, analysts, and researchers an in-depth understanding of the inner workings of cloud Platform-as-a-Service (PaaS)…
Read More » -
ហានិភ័យអនឡាញសម្រាប់កូនរបស់អ្នក
អ្នកណាមិនស្រឡាញ់កូន ឃើញកូនធ្វើអីក៏ចេះតែចង់ថត ហើយមិនត្រឹមថតទេ បង្ហោះលើអនឡាញទៀត។ តែតើអ្នកដឹងទេ ថានៅពីក្រោយក្តីស្រឡាញ់នោះជាហានិភ័យមួយសម្រាប់កូនអ្នក? នៅពេលដែលអ្នកបង្ហោះរូបភាព ឬធ្វើសកម្មភាពមិនត្រឹមត្រូវនៅលើបណ្ដាញសង្គមដែលមានមនុស្សជាច្រើនប្រភេទរស់នៅ ហើយកូនរបស់អាចនឹងក្លាយជាជនរងគ្រោះមួយនៃអំពើបៀតបៀនតាមប្រព័ន្ធអនឡាញដែរ។ ចូលរួមជាមួយ ជំរំឌីជីថល ក្នុងយុទ្ធនាការ «Be Nice On the Internet» ដើម្បីបញ្ឈប់ការបៀតបៀនតាមប្រព័ន្ធអនឡាញទាំងអស់គ្នា។ នៅលើពិភពអនឡាញ មានមនុស្សគ្រប់ប្រភេទ…
Read More » -
Webinar: National Cybersecurity Strategies – Implementation and Monitoring
The International Telecommunication Union (ITU) organized an online discussion on the lifecycle development and implementation of a National Cybersecurity Strategy.…
Read More » -
ការបៀតបៀនតាមប្រព័ន្ធអនឡាញ
ធ្លាប់ទទួលបានពាក្យចំអក ឡកឡឺយតាមអ៊ិនធឺណិតដែលអត់? ហើយប្រហែលអ្នកដែលប្រើពាក្យចំអក បន្តុះបង្អាប់នោះ គិតថាវាជារឿងលេងសើចបែបធម្មតាៗទៀត ទាំងដែលពាក្យទាំងនោះបានបង្កផលប៉ះពាល់មិនធម្មតាមកលើយើងជាអ្នកទទួល។
Read More » -
How to Get Into Cybersecurity with No Experience
In coordination with the National Initiative for Cybersecurity Education (NIST NICE), I will be livestreaming a presentation and QA on…
Read More »