Cybersecurity & Privacy

Danger in Plain Sight: Cyber Threats in Social Media


Contrary to popular belief, some of the most devastating cyber-attacks originate in seemingly harmless popular social media platforms such as Facebook, Instagram, Twitter, and LinkedIn. In this session, cyber threat intelligence team leader Dr. Guy Almog (Cyberint) will go over different kinds of cyber threats which are often hiding right under your nose, and explore some of the best ways to mitigate and prevent them.

Essentials of an Effective Third-Party Risk Management Framework: A Practical Guide


Establishing effective third-party vendors has been at the forefront of business development strategies today. With the current remote workforce setup, the importance of having efficient vendors to streamline complex business processes has been underscored, and more companies started depending on several third-party software to help with their operations. This growing reliance on vendors and other service providers, however, has opened newer risks of breaches and has intensified the call for organizations to employ a third-party management framework that is not only effective, but is also holistic.

Go to Top