Western Sydney University Innovation and Entrepreneurship Alumni Award

Western Sydney University Alumni Award – Innovation and Entrepreneurship 2022

Western Sydney University Alumni Award I received a great LinkedIn message today, which made me really proud as an Alumni of the University who graduated 16 years ago (2006). The "Western People and Sucess Team" reached out to me sharing the news that " I have been nominated, by the University to the 2022 Innovation and Entrepreneurship Alumni Award. I know I...


CEH Hall of Fame Annual Report

CEH Hall of Fame Annual Report 21

CEH Hall of Fame Annual Report The EC Council has just published a report and as a member of the EC Council CEH Hall of Fame, I am thrilled to share with you that I am part of this report: A Glimpse into the C|EH Hall of Fame Annual Report 2021 Bridging the cybersecurity skills gap and creating life-changing career opportunities: The Certified Ethical...


DX Inspire Award 2022 Dr Erdal Ozkaya

DX Inspire Award – 2022 Better together

DX Inspire Award I am extremely honored to announce that Global CISO Forum has awarded me with the prestigious DX Inspire Awards for my contributions to the Cybersecurity and CISO Community. I am earnestly grateful for the recognition and thank the Inspire Commitee for selecting me. I always love to be part of communities as I honestly believe we can achieve much...


Practical Cyber Threat Intelligence

Practical Cyber Threat Intelligence – New Book (17th)

Practical Cyber Threat Intelligence This is my seventeenth book with my name on the cover and like its predecessors, this book represents several years of in-depth research, analysis, and real-life work experience. While working as a Chief Information Security Officer (CISO )in a world class cybersecurity firm (Comodo Cybersecurity), spending time with cybersecurity communities, authoring a book means “stealing time from the...


2022 Global Top 100 Leaders in Information Security

2022 Global Top 100 Leaders in Information Security

2022 Global Top 100 Leaders in Information Security I am thrilled to announce that I have been selected to be in the Global Top 100 Information Security list by Corinium. Based on Corinium this Top 100 list exist to celebrate the outstanding work over the last 12 months of some of the greatest minds in information security. As an organization, Corinium is...


The Art of Breach Detection

Learn The Art of Breach Detection – Free Video 4

Learn The Art of Breach Detection Do you want to learn the key secrets of Breach Detection? Then this free video is right for you: https://youtu.be/DQOD2jRn8r4   Hackers will never stop their attack attempts, and organizations must be aware they could be breached any second! So, tune into this presentation to discover: • How to best prepare against those attacks? • What tools to leverage? • How...


Posted By Category: Cyber Security, Video TutorialsComments: 0
Cybersecurity Questions Boards Need to Address

4 Cybersecurity Questions Boards Need to Address – Free Guide

4 Cybersecurity Questions Boards Need to Address The world has changed a lot since the first case of COVID was found in Wuhan. The virus did not just affect our day-to-day lives, but also our work. As a Board member of an organization, how much do you understand about Cybersecurity or the changing world’s impact on your security posture? Do you...


The Art of Breach Detection

The Art of Breach Detection

The Art of Breach Detection Join my latest session online which is brought to you by TechTarget and BrightTalk . Registration is free and below are the details: Hackers will never stop their attack attempts, and organizations must be aware they could be breached any second! So, tune into this presentation to discover: • How to best prepare against those attacks? • What tools...


Posted By Category: AnnouncemetsTags: Comments: 0
Why Dynamic Businesses Should Embrace Digital Transformation

Embrace Digital Transformation – Free Webinar Recording -22

Embrace Digital Transformation Why Dynamic Businesses Should Embrace Digital Transformation There is no “one-size-fits-all” transformation manual when it comes to changing the way we do business, and never will be. In this dynamically changing environment, hybrid multicloud architectures offer flexibility and scalability, and an answer to the challenges faced by evolving IT infrastructures in companies of all sizes. Equinix and guest speakers from...


Cybersecurity Metrics

Cybersecurity Metrics To Report To The Board – With 2 great examples

Cybersecurity Metrics to Report to the Board Information Technology (IT) is all about metrics. Each and every system creates logs, and in a mid-size organization, the number can be exceedingly high. The same applies to security, of course. It is clear that the Board will not care about every system; they certainly tend to leave day-to-day IT management to the CIO...