Ignite Your Cyber Security Journey at the OzSec 2024 Boot Camp
Join us for an intensive, four-hour deep dive into the world of cybersecurity. Designed for both newcomers and professionals, this boot camp is your opportunity to gain practical insights from industry experts.
Explore the evolving threat landscape, discover cutting-edge defense tools, understand the critical role of company culture in security, and master the complexities of governance and compliance. Our interactive format combines expert lectures with open discussions, allowing you to ask questions, share experiences, and network with peers. Don't miss this chance to elevate your cybersecurity knowledge and skills.
Speakers:
Alex Karkins is a seasoned security professional currently working at Talos (Cisco) as a Security Research Engineer with over a decade of security experience.
Speaker for Defensive Tools and Technologies .
Speaker for Business Culture and Security AwarenessSpeaker Cyber Security Governance and Compliance
Cyber Security Bootcamp Outline
Hour 1: Current Threats
Understanding the Threat Landscape
Types of cyber attacks (ransomware, phishing, DDoS, etc.)
https://ozsec.sharepoint.com/:w:/s/OzSec_Conference/EWw-FdRQpeZGnTbe9qdQ6NAB7N9m8pBvKOTJqpuAoZbdww?e=xsDW5Q
Ignite Your Cyber Security Journey at the OzSec 2024 Boot Camp
Join us for an intensive, four-hour deep dive into the world of cybersecurity. Designed for both newcomers and professionals, this boot camp is your opportunity to gain practical insights from industry experts.
Explore the evolving threat landscape, discover cutting-edge defense tools, understand the critical role of company culture in security, and master the complexities of governance and compliance. Our interactive format combines expert lectures with open discussions, allowing you to ask questions, share experiences, and network with peers. Don't miss this chance to elevate your cybersecurity knowledge and skills.
Speakers:
Alex Karkins is a seasoned security professional currently working at Talos (Cisco) as a Security Research Engineer with over a decade of security experience.
Speaker for Defensive Tools and Technologies .
Speaker for Business Culture and Security AwarenessSpeaker Cyber Security Governance and Compliance
Cyber Security Bootcamp Outline
Hour 1: Current Threats
Understanding the Threat Landscape
Types of cyber attacks (ransomware, phishing, DDoS, etc.)
Threat actors (hacktivists, nation-states, organized crime)
The role of threat intelligence
Real-world Case Studies
High-profile cyber incidents
Lessons learned and best practices
Hour 2: Defensive Tools and Technologies
Network Security
Firewalls, intrusion detection and prevention systems (IDPS)
Virtual private networks (VPNs)
Network segmentation
Endpoint Security
Antivirus and anti-malware software
Endpoint detection and response (EDR)
Encryption
Identity and Access Management (IAM)
Authentication and authorization
Single sign-on (SSO)
Privileged access management (PAM)
Cloud Security
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS)
Cloud security models (shared responsibility)
Cloud security controls
Incident Response and Disaster Recovery
Incident response planning and procedures
Business continuity and disaster recovery (BCDR)
Hour 3: Business Culture and Security Awareness
Creating a Security-Conscious Culture
Importance of employee awareness
Social engineering tactics and prevention
Security policies and procedures
Risk Management and Assessment
Identifying and assessing risks
Risk mitigation strategies
Business impact analysis (BIA)
Data Privacy and Protection
Data classification and protection
Compliance with regulations (GDPR, CCPA, HIPAA, etc.)
Data breach response
Hour 4: Cyber Security Governance and Compliance
Cybersecurity Governance Framework
Roles and responsibilities
Governance structures and committees
Security policies and standards
Compliance and Regulations
Overview of key cybersecurity regulations
Compliance challenges and best practices
Auditing and monitoring
Security Metrics and KPIs
Measuring cybersecurity performance
Key performance indicators (KPIs)
Reporting and communication