Free Webinar : Erdal’s update on the current cyber security threat profile

Join Microsoft #Cybersecurity Architect Dr Erdal Ozkaya tonight (7-8:30pm AEST) to hear about current threats and his fascinating doctorate research. I first met Erdal back in 2012 when he was Chief Technology Officer for an IT infrastructure design company called Fastlane. Erdal’s enthusiasm and vitality was infectious and I couldn't help but suggest he channel it into postgraduate study. Erdal [...]


Hiring a Cybersecurity Architect

I am searching for a Cybersecurity Architect with practical experience in MS Infrastructure Security, AD Security, Network Security. Strong understanding of the Cyber Kill Chain and the controls required to protect, detect and respond at each of the layers. Able to manage various IT stakeholders, advocate and mentor security best practices and drive implementations. This is a highly visible and [...]


Posted By Category: GeneralComments: 0

Free Webinar : A cybersecurity strategy for the financial sector

Understand the threats to financial cyberspace and learn how to implement the right strategy to secure your organization. This presentation will take you through some of the most well known case studies and real life threat scenarios and how to tackle them so as to protect your financial services and related infrastructure. (more…)


Posted By Category: GeneralComments: 0

My Doctorate Graduation speech

I had a dream, a dream which was not so easy to reach; I planned I had to take the necessary steps to achieve to my goal; I acted There were times where I felt alone, where I thought I will never go through, I had some negative feedback which I needed to address, times I fall; I learned from all those to [...]


Cybersecurity Canon Candidate Book Review: Learn Social Engineering

  Executive Summary Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert will equip you with a holistic understanding of social engineering. It will help you  avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. The book covers topics ranging from baiting, phishing, and spear phishing, to pretexting [...]