What You Need to Know Before
You Start

Starts 2 July 2025 12:46

Ends 2 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

What Lurks in the Shadow

Join expert Cheryl Biswas on an intriguing exploration of hidden cybersecurity threats in the talk titled "What Lurks in the Shadow." This insightful session provides valuable knowledge on identifying and defending against unseen vulnerabilities within your systems. Hosted exclusively on YouTube, this event is categorized under Artificial I.
via YouTube

2765 Courses


23 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Join expert Cheryl Biswas on an intriguing exploration of hidden cybersecurity threats in the talk titled "What Lurks in the Shadow." This insightful session provides valuable knowledge on identifying and defending against unseen vulnerabilities within your systems.

Hosted exclusively on YouTube, this event is categorized under Artificial Intelligence Courses and Conference Talks, making it an essential watch for anyone looking to enhance their understanding of cybersecurity in today's digital age.

Dive into the shadows of cybersecurity with Cheryl Biswas and gain the insights you need to fortify your systems against potential dangers.

Syllabus

  • Introduction to Cybersecurity Threats
  • Overview of cybersecurity landscape
    Importance of understanding hidden threats
  • Types of Hidden Threats
  • Malware and ransomware
    Phishing and social engineering
    Insider threats
    Advanced persistent threats (APTs)
  • Unseen Vulnerabilities
  • Zero-day vulnerabilities
    Software and hardware backdoors
    Supply chain vulnerabilities
  • Detection and Prevention Strategies
  • Threat detection and monitoring tools
    Endpoint protection and network security measures
    Incident response planning
    Patch management and vulnerability scanning
  • Emerging Technologies and Threats
  • Artificial intelligence in cybersecurity
    Internet of Things (IoT) security challenges
    Cloud security and data privacy concerns
  • Case Studies and Real-world Incidents
  • Analysis of notable cybersecurity breaches
    Lessons learned and best practices
  • Building a Proactive Security Culture
  • Developing security awareness training
    Building resilient IT infrastructure
    Collaboration with legal and compliance teams
  • Future Directions in Cybersecurity
  • Trends in cybersecurity research
    The role of policy and regulation
    Anticipating future threats
  • Conclusion and Final Insights
  • Recap of key learnings
    Final thoughts from expert Cheryl Biswas

Subjects

Conference Talks