Top
Image Alt

Events

  /  Events

Enterprise Ireland and the National Cyber Security Centre (NCSC) have launched two new grants to  help Irish companies review and strengthen their security posture.  Make the Cyber Security Review Grant your first/next step towards growing your business and protecting it from cyber threats. Digital tools enhance businesses capabilities to build competitive advantage and drive growth. With digital transformation comes risk and it is crucial that organisations protect sensitive information and mitigate the risk of cyber-attacks. Your company could save 80% off a €3,000 cyber security review. Enterprise Ireland, in collaboration with

Mitigating injection attacks requires an approach that  incorporates secure coding practices at every stage of application development and deployment.  Web applications have transformed how consumers and businesses interact, offering enhanced speed, convenience, and user experience. However, these benefits also introduce significant risks, as the accessibility of web applications through browsers makes them prime targets for cyberattacks. The vulnerabilities in web applications can be exploited, potentially providing attackers with access to sensitive personal and financial data. According to the 2024 Verizon Data Breach Investigations Report, web applications held the top spot as

Building applications for an ever-changing threat landscape is critical and challenging. Join Fabio Cerullo at the ISC2 Security Congress in Las Vegas for a highly interactive Threat Modeling workshop and learn how to build resilient web applications. Threat Modeling Workshops are scheduled for the two days before ISC2 Security Congress 2024 officially opens – Saturday, October 12 and Sunday, October 13. The workshop combines theory review and a strong emphasis on practical exercises. Participants on the Threat Modeling Workshop will learn how to: Integrate threat modeling into the application development life cycle Apply

Web application vulnerabilities can be exploited to access critical and confidential data. Join Fabio Cerullo at OWASP 2024 Global AppSec San Francisco for a highly interactive session on Web Application Security Essentials Web applications play a key role in the success of an organisation, from streamlining business processes to creating online interactions that ensure a positive customer experience. However, web applications do allow access to critical and confidential resources. But, without understanding web application vulnerabilities and addressing them, organisations risk their data, their operations and their reputation. At OWASP 2024 Global

The demand for skilled cybersecurity professionals continues to grow in response to increased reliance on technology matched by a steady rise in cybercrime. The European Cybersecurity Skills Framework (ECSF) - developed by ENISA (The European Union Agency for Cybersecurity) establishes a common understanding of the roles, competencies, skills, and knowledge required in the cybersecurity field.   Why the European Cybersecurity Skills Framework is important The ECSF provides a structured approach to defining and recognising cybersecurity skills, helping individuals to effectively manage their professional development and career paths.  By aligning certification credentials with professional roles,

Companies rely on ISC2-certified professionals to prepare for and recover from cyberattacks. ISC2 certifications are recognised as the gold standard in the industry and demonstrate comprehensive and professional knowledge critical to developing and protecting systems and data.  With ISC2 certifications so highly regarded in the cybersecurity industry, there is no shortage of training companies that offer preparation for the ISC2 certification exam. Not all of these are affiliated with ISC2. It is important to know who you’re partnering with and understand the benefits of engaging an ISC2 Official Training Partner. As an

ISC2 has introduced Computerized Adaptive Testing for CISSP exams. Based on the same exam content outline as the linear, fixed-form exam, CISSP Computerized Adaptive Testing (CAT) is a more precise and efficient evaluation of your competency. CISSP CAT enables you to prove your knowledge by answering fewer items and completing the exam in half the time. How Does it Work? “Each candidate taking the CISSP CAT exam will start with an item that is well below the passing standard. Following a candidate's response to an item, the scoring algorithm re-estimates the candidate's

Many cybersecurity professionals have questions about the Certified Cloud Security Professional CCSP certification – what is it, why should I consider it, what is involved and lots more. If you are thinking about ISC2 CCSP Certification and are interested in learning more about the process and requirements, the Certified Cloud Security Professional CCSP - FAQ may give you some answers. If you do not find what you are looking for, please contact us and we would be delighted to answer your questions. What is the Certified Cloud Security Professional CCSP

“AI in Cyber 2024: Is the Cybersecurity Profession Ready?” is a survey of 1,123 ISC2 members with security responsibilities. The results provide insight into what is the impact of AI on the cybersecurity industry. The development and capabilities of AI have accelerated in recent years. What was once the stuff of movies is very much a reality. Here are some of the key insights from the AI in Cyber 2024 survey.   AI is having an impact on the cybersecurity industry. This impact is expected to increase as professionals utilise AI-based tool and in responding

Web application vulnerabilities can be exploited to access critical and confidential data. Join Fabio Cerullo at OWASP 2024 Global AppSec Lisbon for a highly interactive session on Web Application Security Essentials Web applications play a key role in the success of an organisation, from streamlining business processes to creating online interactions that ensure a positive customer experience. However, web applications do allow access to critical and confidential resources. But, without understanding web application vulnerabilities and addressing them, organisations risk their data, their operations and their reputation. At OWASP 2024 Global AppSec