Cyber Attack Detection and Quick Response Strategy
IEEE Section Night - NOW AS A WEBINAR!
Webinar link and password will be forwarded to all registered participants after Noon on the day of the meeting. Check your spam folder if you don't see the email.
Webinar is open to all.
Cyber Attack Detection and Quick Response Strategy
With regard to online activities, one should really be aware of the existence of cyber threats, metaphorically described as some sort of 'digital enemies' that seek many ways to compromise our systems. In this regard, we go on to discuss the very important topic entitled "Cyber Attack Detection and Quick Response Strategy," concerning recognition of the potential threats such as phishing, malware, and DDoS attack, and understand ways to handle them. We are also going to cover how to develop investigative skills that could help in the detection of irregular activities, and development of a contingency plan to be implemented when an attack is successful. We'll also look at advanced hardening strategies and why training your team and security assessments are so important. By the end of our discussion, participants will be fully empowered in the protection of digital assets, identification of any likely threats, and the neutralization of such threats to render the cyber adversary impotent.
Date and Time
Location
Hosts
Registration
- Date: 18 Mar 2025
- Time: 07:00 PM to 08:00 PM
- All times are (GMT-05:00) US/Eastern
- Add Event to Calendar
- Starts 19 February 2025 12:00 AM
- Ends 18 March 2025 12:00 PM
- All times are (GMT-05:00) US/Eastern
- Admission fee ?
Speakers
Mr Sairam Durgaraju
Cyber Attack Detection and Quick Response Strategy
Biography:
I am an experienced cybersecurity and cloud security architect with over 17 years of expertise in designing and implementing secure access management solutions. My career has focused on securing cloud environments across major platforms like AWS, Azure, and GCP, where I specialize in building robust security frameworks, managing identity and access management (IAM) systems, and ensuring comprehensive threat detection and vulnerability management. I have a deep passion for integrating security into DevOps processes, using tools like Terraform, Ansible, and Docker to automate secure deployments. I am proficient in managing IAM platforms like Okta, IBM ISAM, and Auth0, and have successfully implemented OAuth, OIDC, JWT tokens, and multi-factor authentication (MFA) to enhance security across various infrastructures. In addition to my technical work, I enjoy mentoring and sharing knowledge with the next generation of cybersecurity professionals. I hold multiple certifications, including CHFI, CEH,IBM ISAM, OKTA, PING and AWS Security Specialty, which further reflect my commitment to staying on top of the latest in the cybersecurity landscape. I am dedicated to driving innovation and strengthening security for organizations, ensuring they are protected from evolving cyber threats.
Address:United States
Agenda
WEBINAR: 7:00 - 8:00 P.M.
The Zoom Webinar link and password will be forwarded to all registered participants after Noon on the day of the meeting. Check your spam folder if you don't see the email.
Webinar is open to all.
PDH certificates are available and an evaluation form will be emailed to you after the meeting. PDH certificate are sent by IEEE USA 3-4 weeks after the meeting.