Cyber Attack Detection and Quick Response Strategy

#philadelphia, #march, #cyber #attack #detection
Share

IEEE Section Night - NOW AS A WEBINAR!

Webinar link and password will be forwarded to all registered participants after Noon on the day of the meeting. Check your spam folder if you don't see the email. 

Webinar is open to all.


Cyber Attack Detection and Quick Response Strategy

With regard to online activities, one should really be aware of the existence of cyber threats, metaphorically described as some sort of 'digital enemies' that seek many ways to compromise our systems. In this regard, we go on to discuss the very important topic entitled "Cyber Attack Detection and Quick Response Strategy," concerning recognition of the potential threats such as phishing, malware, and DDoS attack, and understand ways to handle them. We are also going to cover how to develop investigative skills that could help in the detection of irregular activities, and development of a contingency plan to be implemented when an attack is successful. We'll also look at advanced hardening strategies and why training your team and security assessments are so important. By the end of our discussion, participants will be fully empowered in the protection of digital assets, identification of any likely threats, and the neutralization of such threats to render the cyber adversary impotent.



  Date and Time

  Location

  Hosts

  Registration



  • Date: 18 Mar 2025
  • Time: 07:00 PM to 08:00 PM
  • All times are (GMT-05:00) US/Eastern
  • Add_To_Calendar_icon Add Event to Calendar
If you are not a robot, please complete the ReCAPTCHA to display virtual attendance info.
  • Contact Event Host
  • Starts 19 February 2025 12:00 AM
  • Ends 18 March 2025 12:00 PM
  • All times are (GMT-05:00) US/Eastern
  • Admission fee ?


  Speakers

Mr Sairam Durgaraju

Topic:

Cyber Attack Detection and Quick Response Strategy

Biography:

I am an experienced cybersecurity and cloud security architect with over 17 years of expertise in designing and implementing secure access management solutions. My career has focused on securing cloud environments across major platforms like AWS, Azure, and GCP, where I specialize in building robust security frameworks, managing identity and access management (IAM) systems, and ensuring comprehensive threat detection and vulnerability management. I have a deep passion for integrating security into DevOps processes, using tools like Terraform, Ansible, and Docker to automate secure deployments. I am proficient in managing IAM platforms like Okta, IBM ISAM, and Auth0, and have successfully implemented OAuth, OIDC, JWT tokens, and multi-factor authentication (MFA) to enhance security across various infrastructures. In addition to my technical work, I enjoy mentoring and sharing knowledge with the next generation of cybersecurity professionals. I hold multiple certifications, including CHFI, CEH,IBM ISAM, OKTA, PING and AWS Security Specialty, which further reflect my commitment to staying on top of the latest in the cybersecurity landscape. I am dedicated to driving innovation and strengthening security for organizations, ensuring they are protected from evolving cyber threats.

Address:United States





Agenda

WEBINAR: 7:00 - 8:00 P.M. 

The Zoom Webinar link and password will be forwarded to all registered participants after Noon on the day of the meeting. Check your spam folder if you don't see the email. 

Webinar is open to all.

PDH certificates are available and an evaluation form will be emailed to you after the meeting. PDH certificate are sent by IEEE USA 3-4 weeks after the meeting.