Sponsored by Keepnet Labs

Forensics

A STRATEGIC PERSPECTIVE INTO THE TRADECRAFT OF THREAT ACTORS

Phishing and ransomware have been effective weapons for hackers. Even the most sophisticated cybersecurity measures have not been able to tackle these simple yet serious threats. In this upcoming GISEC.virtual interactive forum, powered by CyberKnight, we will be uncovering the trade secrets of cyber-attackers. A panel of technology advocates and end-user critics will be discussing the effectiveness of cyber threat [...]


Video : The Move Towards a Digital, Sustainable, and Resilient Future

The Annual Investment Meeting  organized by the Ministry of Economy, UAE, which is Under the Patronage of HH Sheikh Mohammed bin Rashid Al Maktoum Vice-President and Prime Minister of the UAE and Ruler of Dubai was conducted between October 20-22. I was also invited to the event as panelist. This year's virtual conference's theme 'Reimagining Economies - The Move Towards [...]


Video Training: Learn about System Information Discovery

Join Dr. Carlo Tarantini, Dr Suleyman Ozarslan and myself via watching this on-demand webinar recording  which can help you to learn about How do adversaries leverage 'System Information Discovery' into their targets? What are the significant benefits that T1082 provides for adversaries? What are the use cases by threat actors and their malware? How do Red Teams simulate this [...]


Artificial Intelligence: The Ultimate Weapon in the War against Cyber Criminals

For a legion of cybersecurity experts from across the globe, CISO MAG hosted a Fireside Chat with Dr. Erdal Ozkaya on the topic, “AI: The Ultimate Weapon in the War against Cyber Criminals.” Dr. Ozkaya is a an award-winning CISO of a regional bank. The Fire Chat was moderated by Brian Pereira, Principal Editor of CISO MAG, who interviewed Dr Erdal. It [...]


Forensic investigation of a Social Engineering attack, from real life

In this article I am going to share with you a real Social Engineering attack , where we worked in a case to investigate if there was any forensic evidence to suggest that the laptop computer a) had been compromised by the perpetrator(s), b) if found to be compromised, how, when, and by whom it was compromised, c) [...]


Logical Operations Certifications Industry Contributor

ssued By Logical Operations / Communispond Earners of the Logical Operations Certifications: Industry Contributor badge have served as Subject Matter Experts and/or Scheme Committee Members for the development of a Logical Operations certification program. They have provided valuable industry expertise regarding the knowledge, skills, and abilities that certificants will be tested on via the certification exam. The holder of this badge [...]


Windows 10 Security in Real Life

As a Network Administrator, do you wonder how Windows 10 can help you protect against everyday security threats? Join popular experts Erdal Ozkaya and Raymond Comvalius for an in-depth look at the most secure Windows ever, and see how to put the new features to work for you right away, as you build up your Windows 10 [...]


CyberSec First Responder

I am proud to announce that I am working with Logical Operations together, along other Cybersecurity Industry Experts on developing their new Course and Exam . About CyberSec First Responder YOU are the first line of defense your organization has against a cyber security attack. Don't leave it to chance. Become CFR certified. By taking an approach where an understanding of [...]