OzSecICT / ozsecurityweb

0 stars 2 forks source link

Business Track Page #4

Open lateTWoIT opened 2 months ago

lateTWoIT commented 2 months ago

https://ozsec.sharepoint.com/:w:/s/OzSec_Conference/EWw-FdRQpeZGnTbe9qdQ6NAB7N9m8pBvKOTJqpuAoZbdww?e=xsDW5Q

Ignite Your Cyber Security Journey at the OzSec 2024 Boot Camp

Join us for an intensive, four-hour deep dive into the world of cybersecurity. Designed for both newcomers and professionals, this boot camp is your opportunity to gain practical insights from industry experts.

Explore the evolving threat landscape, discover cutting-edge defense tools, understand the critical role of company culture in security, and master the complexities of governance and compliance. Our interactive format combines expert lectures with open discussions, allowing you to ask questions, share experiences, and network with peers. Don't miss this chance to elevate your cybersecurity knowledge and skills.

Speakers:

Alex Karkins is a seasoned security professional currently working at Talos (Cisco) as a Security Research Engineer with over a decade of security experience.

Speaker for Defensive Tools and Technologies .

Speaker for Business Culture and Security AwarenessSpeaker Cyber Security Governance and Compliance

Cyber Security Bootcamp Outline

Hour 1: Current Threats

Understanding the Threat Landscape

Types of cyber attacks (ransomware, phishing, DDoS, etc.)

Threat actors (hacktivists, nation-states, organized crime)

The role of threat intelligence

Real-world Case Studies

High-profile cyber incidents

Lessons learned and best practices

Hour 2: Defensive Tools and Technologies

Network Security

Firewalls, intrusion detection and prevention systems (IDPS)

Virtual private networks (VPNs)

Network segmentation

Endpoint Security

Antivirus and anti-malware software

Endpoint detection and response (EDR)

Encryption

Identity and Access Management (IAM)

Authentication and authorization

Single sign-on (SSO)

Privileged access management (PAM)

Cloud Security

Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)

Cloud security models (shared responsibility)

Cloud security controls

Incident Response and Disaster Recovery

Incident response planning and procedures

Business continuity and disaster recovery (BCDR)

Hour 3: Business Culture and Security Awareness

Creating a Security-Conscious Culture

Importance of employee awareness

Social engineering tactics and prevention

Security policies and procedures

Risk Management and Assessment

Identifying and assessing risks

Risk mitigation strategies

Business impact analysis (BIA)

Data Privacy and Protection

Data classification and protection

Compliance with regulations (GDPR, CCPA, HIPAA, etc.)

Data breach response

Hour 4: Cyber Security Governance and Compliance

Cybersecurity Governance Framework

Roles and responsibilities

Governance structures and committees

Security policies and standards

Compliance and Regulations

Overview of key cybersecurity regulations

Compliance challenges and best practices

Auditing and monitoring

Security Metrics and KPIs

Measuring cybersecurity performance

Key performance indicators (KPIs)

Reporting and communication

lateTWoIT commented 2 months ago

Started - Waiting on input from speakers

lateTWoIT commented 2 months ago

No link from index yet. Proofing with the speakers and gathering further information.

https://ozsecurity.org/BusinessLeadershipTrack.html