General

What is IT Security Policy :0

What is IT Security Policy ? The essence of an IT security policy, is to establish guidelines and standards for accessing the organization's information and application systems. As IT infrastructures have become more complex and organization's resources have become more distributed, the need for improved information security has increased. An IT security policy, facilitates the communication of security procedures to users and...


Posted By Category: Cyber Security, General, ISO 20000/2700xComments: 0
update on the current cyber security threat profile

Erdal’s update on the current cyber security threat profile Free Webinar :

update on the current cyber security threat profile Join Microsoft #Cybersecurity Architect Dr Erdal Ozkaya tonight (7-8:30pm AEST) to hear about current threats and his fascinating doctorate research. I first met Erdal back in 2012 when he was Chief Technology Officer for an IT infrastructure design company called Fastlane. Erdal’s enthusiasm and vitality was infectious and I couldn't help but suggest he...


Hiring

Hiring a Cybersecurity Architect – Great Job opportunity 2019

Hiring a Cybersecurity Architect I am searching for a Cybersecurity Architect with practical experience in MS Infrastructure Security, AD Security, Network Security. Strong understanding of the Cyber Kill Chain and the controls required to protect, detect and respond at each of the layers. Able to manage various IT stakeholders, advocate and mentor security best practices and drive implementations. This is a highly...


Posted By Category: GeneralComments: 0
A cybersecurity strategy for the financial sector

A cybersecurity strategy for the financial sector : Free Webinar 2

A cybersecurity strategy for the financial sector Understand the threats to financial cyberspace and learn how to implement the right strategy to secure your organization. This presentation will take you through some of the most well known case studies and real life threat scenarios and how to tackle them so as to protect your financial services and related infrastructure. (more…)


Posted By Category: GeneralComments: 0
Security and Privacy in Communications Networks Dr Erdal Ozkaya

19 Best New Cybersecurity Books To Read In 2019

19 Best New Cyber Security Books To Read In 2019 Security and Privacy in Communications Networks About The book: As featured on CNN, Forbes, and Inc – BookAuthority identifies and rates the best books in the world, based on public mentions, recommendations, ratings and sentiment Security and Privacy in Communications Networks Dr Erdal Ozkaya About the book : This book constitutes the refereed proceedings of...


Posted By Category: Awards, Book Reviews, General, My BooksComments: 0
CyberSecurity Master Class

CyberSecurity Master Class KSA

CyberSecurity Master Class Cybersecurity Master-class in Jeddah, KSA. In 4 days I have visited 4 cities, 3 countries but it was worth it .. . Thank you for all our customers for attending, Microsoft KSA and our team for organizing this events. Microsoft KSA Cybersecurity Master-Class together with CQURE Inc. is today in our Riyadh office. It's always a pleasure to talk...


Dr Erdal Ozkaya

Doctorate Graduation speech – free

My Doctorate Graduation speech I had a dream, a dream which was not so easy to reach; I planned I had to take the necessary steps to achieve to my goal; I acted There were times where I felt alone, where I thought I will never go through, I had some negative feedback which I needed to address, times I fall; I learned from all...


CISO Executive Summit by Microsoft – 3 Countries

CISO Executive Summit by Microsoft We are happy to announce the 3th edition of the CISO Executive Series - a series for an elite set of TOP Chief Information Security Officers. Engage in candid conversations with the most influential CISO's and subject matter experts in a day of insights , networking and learning. Pinpoint strategies, best practices from GCC organizations , evaluate regional...


Certification magazine Erdal

Effective cybersecurity requires participation from all

Effective cybersecurity requires participation from all Ask a random person on the street what cybersecurity means to him or her, and you might get a response that refers to the most recent big data breach. It’s hard to ignore being constantly told by major news outlets that the “private” in “private information” is a bad joke, and that not a single...


Posted By Category: GeneralComments: 0
The Use Of Social Media for Terrorism

The Use Of Social Media for Terrorism

The Use Of Social Media for Terrorism   Abstract: This study goes through the ways in which terrorists have been exploiting social media. It explains how terrorist propaganda has been littered all over the internet. It explains how terrorist groups are recruiting new fighters on social media with special interest on westerners. The study also goes through how the increased encryption of...