Global Cybersecurity Conference 2024



Free Download Global Cybersecurity Conference 2024
Published 7/2024
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 21h 44m | Size: 6.08 GB
Video description


Dive into the cutting-edge of cybersecurity with this exclusive video bundle from the Global Cybersecurity Conference 2024. This comprehensive video bundle features in-depth talks and workshops led by world-renowned experts, designed to enhance your understanding and response to emerging cyber threats.
This bundle is perfect for cybersecurity professionals seeking to stay ahead of the curve, enhance their strategic approaches, and equip their teams with advanced knowledge and techniques. Whether you’re a CISO, IT manager, or a cybersecurity enthusiast, these sessions offer valuable insights and practical advice to navigate the complex landscape of cyber threats.
What you will learn
Rapid cloud adoption and essential, vendor-agnostic security strategies
Generative AI’s role in training and threat simulation
Implement Zero Trust in hybrid environments for better security
Engage in a roundtable on AI’s ethical and practical impacts on security
Understand effective penetration testing to identify and reduce risks
Analyze TLS vulnerabilities and their influence on future cryptographic protocols
Review Gartner’s top security trends and their strategic impacts
Audience
Ideal for cybersecurity professionals, IT executives, and technology innovators, this video bundle from the Global Cybersecurity Conference 2024 offers invaluable insights into the latest cybersecurity strategies and emerging technologies. It caters to everyone from CISOs and security architects to compliance officers and academic researchers looking to deepen their understanding and enhance their approaches to modern cyber threats and defense frameworks.
About the Authors
Ian Neil: Ian Neil is one of the world’s top trainers of Security+. He is able to break down information into manageable chunks so that people with no background knowledge can gain the skills required to become certified. He has recently worked for the US Army in Europe and designed a Security+ course that catered to people from all backgrounds (not just IT professionals), with an extremely successful pass rate. He is an MCT, MCSE, A+, Network+, Security+, CASP, and RESILIA practitioner that has worked with high-end training providers over the past 23 years and was one of the first technical trainers to train Microsoft internal staff when they opened their Bucharest Office in 2006.
Cynthia Kaiser: Cynthia leads cyber policy, intelligence, and engagement for FBI Cyber, where she seeks every day to ensure FBI information sharing and collaboration is robust, proactive, and stops cyber threats. She has covered cyber and technology issues with the FBI for almost 20 years; served as a PDB Briefer in two administrations and a Cyber Safety Review Board interim member; and is publicly recognized as a top government cyber leader, including by The Cyber Guild and Cyberscoop50. Cynthia is passionate about sharing the stories behind cyber investigations and increasing diversity in cyber professions, and speaks regularly about the need to leverage the unique contributions of people with different identities, experiences, and backgrounds to counter the cyber threats will we face in the future.
Tim Rains: Tim Rains is an internationally recognized cybersecurity executive, advisor, and author. Currently, Tim is Vice President Trust & Cyber Risk at T-Mobile where he leads risk, strategy, assurance, compliance, and vulnerability management. Prior to this, Tim was the Global Security Lead for Worldwide Public Sector at Amazon Web Services. Tim also held the post of Executive Director Cybersecurity Strategy at the Las Vegas Sands Corporation, the world’s largest gaming company. Tim spent 17 years at Microsoft where he worked in numerous roles including Global Chief Security Advisor, Director of Trustworthy Computing, and Technical Lead of Microsoft’s customer-facing Security Incident Response Team.
Dr. Paul Duplys: Dr. Paul Duplys is chief expert for cybersecurity at the department for technical strategies and enabling within the Mobility sector of Robert Bosch GmbH, a Tier-1 automotive supplier and manufacturer of industrial, residential, and consumer goods. Previous to this position, he spent over 12 years with Bosch Corporate Research, where he led the security and privacy research program and conducted applied research in various fields of information security. Paul’s research interests include security automation, software security, security economics, software engineering, and AI. Paul holds a PhD degree in computer science from the University of Tuebingen, Germany.
Yuri Diogenes: Yuri Diogenes has been working at Microsoft since 2006, and currently he is a Principal PM Manager where he manages a Team of PMs for Microsoft CNAPP Solution, Defender for Cloud. Yuri is also a Professor at EC-Council University and Trine University. Yuri has a Master of Science in Cybersecurity Intelligence and Forensics Investigation from Utica College, and he is currently working on his PhD in Cybersecurity Leadership from Capitol Technology University. Yuri has published a total of 32 books, mostly covering information security and Microsoft technologies. Yuri also holds many industry certifications, such as CISSP, E|CND, E|CEH, E|CSA, E|CHFI, E|CTIA, CompTIA Security+, CySA+, Network+, CASP, and MITRE ATT&CK Cyber Threat Intelligence.
Tia Hopkins: Tia Hopkins is the field CTO and chief cyber risk strategist at eSentire. She is also an adjunct professor of cybersecurity at Yeshiva University, a football coach, and is pursuing an executive MBA and Ph.D. in cybersecurity. Tia was recognized by SC Media as an outstanding educator in 2019, as well as one of the Top 25 Women Leaders in Cybersecurity and Top 100 Women in Cybersecurity, both in 2020. In 2021, Tia was recognized as a Top Influencer in the Security Executives category by IFSEC Global. She also contributed a chapter to the book The Rise of Cyber Women: Volume 2. Tia is the founder of Empow(H)er Cybersecurity, a non-profit organization aimed at inspiring and empowering women of color to pursue cybersecurity careers.
David Okeyode: David Okeyode is the EMEA chief technology officer for Azure at Palo Alto Networks. Before that, he was an independent consultant helping companies secure their Azure environments through private expert-level training and assessments. He has authored three books on Azure security – Penetration Testing Azure for Ethical Hackers, Microsoft Azure Security Technologies Certification and Beyond, and Designing and Implementing Microsoft Azure Networking Solutions. He has also authored multiple cloud computing courses for the popular training platform LinkedIn Learning. He holds over 15 cloud certifications across Azure and AWS platforms, including the Azure Security Engineer, Azure DevOps, and AWS Security Specialist certifications. David is married to a lovely girl who makes the best banana cake in the world. They love traveling the world together!
Mike Miller: Mike Miller is a Chief Information Security Officer for Appalachia Technologies. For more than 25 years, Mike has specialized in both offensive and defensive cybersecurity and GRC (Governance, Risk, and Compliance). He has served as an effective liaison between technology and stakeholders, for organizations of all sizes. Mike continues to follow his passion by helping organizations understand business risk and strategically aligning a company’s security posture to protect it.
Steve Wilson: Steve Wilson, a prominent figure in security for Large Language Models (LLMs), led the open-source “Top 10 List for LLM Applications” at the OWASP Foundation. As the Chief Product Officer at Exabeam, he oversaw Product Development, providing code security technology to major organizations. With 25+ years of software platform experience at companies like Citrix, Oracle, and Sun Microsystems, Steve has a rich background. Notably, he transformed Citrix products to SaaS as the VP of Product Management and played a key role in developing the Java programming system at Sun Microsystems. An accomplished author and sought-after speaker, Steve holds a degree in Business Administration and a second-degree black belt in Taekwondo.
Dwayne Natwick, CISSP, MVP: Dwayne is the CEO and Owner of Captain Hyperscaler, LLC. He was previously the Global Principal Cloud Security Lead for Eviden, an atos business. He is also a Microsoft MVP for Security and Azure, AWS Community Builder for Security & Identity, and an author, trainer, and product manager with over 30 years of experience in the IT industry. He is certified in (ISC)2 for CC, CGRC, CCSP, and CISSP, and in multiple Azure and M365 roles, including Microsoft Cybersecurity Architect Expert, Azure Solution Architect Expert, AWS Solution Architect Associate, Azure Administrator Associate, Microsoft Security Analyst Associate, Microsoft Identity and Access Administrator Associate, Microsoft Information Protection Administrator Associate, Azure Security Engineer Associate, and Microsoft 365 Security Administrator Associate. He also has his AWS Solutions Architect Associate and PMI Project Management Professional.
Clint Bodungen: Clint Bodungen is a globally recognized cybersecurity professional and thought leader with 25+ years of experience, and author of Hacking Exposed: Industrial Control Systems. He is a U.S. Air Force veteran, has worked for notable cybersecurity firms Symantec, Booz Allen Hamilton, and Kaspersky Lab, and is a co-founder of ThreatGEN, a cybersecurity gamification and training firm. Clint has been at the forefront of integrating gamification and AI into cybersecurity with his flagship product, ThreatGEN® Red vs. Blue, the world’s first online multiplayer computer game designed to teach real-world cybersecurity. Clint continues his pursuit to help revolutionize the cybersecurity industry using gamification and generative AI.
Mark Dunkerley: Mark Dunkerley is a cybersecurity and technology leader with over 20 years of experience working in higher education, healthcare, and Fortune 100 companies. Mark has extensive knowledge in IT architecture and cybersecurity through delivering secure technology solutions and services. He has experience in cloud technologies, vulnerability management, vendor risk management, identity and access management, security operations, security testing, awareness and training, application and data security, incident and response management, regulatory and compliance, and more. Mark holds a master’s degree in business administration and has received certifications through ISC2, Microsoft, CompTIA, VMware, AXELOS, Cisco, AirWatch, and EMC. Mark has spoken at multiple events, is a published author, sits on customer advisory boards, has published several case studies, and was featured as one of Security magazine’s 2022 Top Cybersecurity Leaders.
Glen D. Singh: Glen D. Singh is a cybersecurity author, educator and SecOps professional. His areas of expertise are cybersecurity operations, offensive security tactics and techniques, and enterprise networking. He holds a Master of Science (MSc) in cybersecurity and many industry certifications from top awarding bodies such as EC-Council, Cisco, and Check Point. Glen loves teaching and mentoring others while sharing his wealth of knowledge and experience as an author. He has written many books, which focus on vulnerability discovery and exploitation, threat detection, intrusion analysis, incident response, network security, and enterprise networking. As an aspiring game changer, Glen is passionate about increasing cybersecurity awareness in his homeland, Trinidad and Tobago.
Santiago von Straussburg: Santiago R. von Straussburg is an accomplished Technical Program Manager with specialized expertise in Cybersecurity and Risk Management. During his impactful tenure at T-Mobile, Santiago successfully led the development and implementation of a comprehensive Cyber-Risk Training and Prevention program, enhancing the security posture of over 80,000 employees. This initiative was a key part of his broader career focus on cybersecurity, data privacy, and technological innovation.
His professional journey also includes significant contributions to Google and Robinhood, where he established universal security standards and managed vendor relationships, respectively. Santiago’s skills in automation, cloud technologies, and project management are underpinned by his advanced knowledge in technical areas like machine learning, Agile, and Scrum methodologies.
Simone Onofri: Simone Onofri is a cybersecurity director with over two decades of experience in Red and Blue Teaming, vulnerability research, and product management. He has been an instructor at the Joint Intelligence and EW Training Centre and is associated with global companies such as HewlettPackard Enterprise. Simone has discovered various vulnerabilities and holds key certifications such as GXPN, GREM, GWAPT, OSCP, and OPSA. An active participant in organizations such as OWASP and ISECOM, he regularly speaks at major conferences, including TEDx. Simone is committed to inspiring and educating industry professionals and enthusiasts through his work, with a mission to create a positive influence.
Debra Baker: Debra Baker has 30 years of experience in Information Security. As CEO of TrustedCISO, Debra provides strategic cybersecurity CISO Advisory Services. She has an AI first startup aiming to power through the pain of Third Party Vendor Assessment and Compliance. Previously, Debra was CISO at RedSeal where she led the security program successfully getting SOC2 Type 2. Previously, she served as Regulatory Compliance Manager at Cisco. While at Cisco she founded the cryptographic knowledge base, CryptoDoneRight in collaboration with Johns Hopkins University. Debra was named one of the top 100 Women in Cybersecurity, "Women Know Cyber: 100 Fascinating Females Fighting Cybercrime."
DDOWNLOAD

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me

Rapidgator
lrfyz.Global.Cybersecurity.Conference.2024.part5.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part6.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part7.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part3.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part2.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part4.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part1.rar.html
Fikper
lrfyz.Global.Cybersecurity.Conference.2024.part5.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part6.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part1.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part2.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part7.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part3.rar.html
lrfyz.Global.Cybersecurity.Conference.2024.part4.rar.html

No Password – Links are Interchangeable