Congratulations!

[Valid RSS] This is a valid RSS feed.

Recommendations

This feed is valid, but interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: https://cybersecthreat.com/feed/

  1. <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
  2. xmlns:content="http://purl.org/rss/1.0/modules/content/"
  3. xmlns:wfw="http://wellformedweb.org/CommentAPI/"
  4. xmlns:dc="http://purl.org/dc/elements/1.1/"
  5. xmlns:atom="http://www.w3.org/2005/Atom"
  6. xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
  7. xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
  8. >
  9.  
  10. <channel>
  11. <title>CyberSecThreat</title>
  12. <atom:link href="https://cybersecthreat.com/feed/" rel="self" type="application/rss+xml" />
  13. <link>https://cybersecthreat.com/</link>
  14. <description>CyberSecurity Solutions</description>
  15. <lastBuildDate>Wed, 06 Nov 2024 15:47:20 +0000</lastBuildDate>
  16. <language>en-US</language>
  17. <sy:updatePeriod>
  18. hourly </sy:updatePeriod>
  19. <sy:updateFrequency>
  20. 1 </sy:updateFrequency>
  21. <generator>https://wordpress.org/?v=6.7.1</generator>
  22.  
  23. <image>
  24. <url>https://cybersecthreat.com/wp-content/uploads/2023/12/CyberSecThreat_website-site-logo-_512x512-min-100x100.png</url>
  25. <title>CyberSecThreat</title>
  26. <link>https://cybersecthreat.com/</link>
  27. <width>32</width>
  28. <height>32</height>
  29. </image>
  30. <item>
  31. <title>IT Asset Disposition (ITAD): A Comprehensive Guide to Secure Data Destruction</title>
  32. <link>https://cybersecthreat.com/2024/11/04/it-asset-disposition-itad-a-comprehensive-guide-to-secure-data-destruction/</link>
  33. <comments>https://cybersecthreat.com/2024/11/04/it-asset-disposition-itad-a-comprehensive-guide-to-secure-data-destruction/#respond</comments>
  34. <dc:creator><![CDATA[Kelvin Yip]]></dc:creator>
  35. <pubDate>Mon, 04 Nov 2024 10:42:59 +0000</pubDate>
  36. <category><![CDATA[Data Destruction]]></category>
  37. <category><![CDATA[Data Disposal]]></category>
  38. <category><![CDATA[Hard Disk Drive Degaussing]]></category>
  39. <category><![CDATA[Hard Disk Drive Destory]]></category>
  40. <category><![CDATA[Hard Disk Drive Destruction]]></category>
  41. <category><![CDATA[Hard Disk Drive Shredding]]></category>
  42. <category><![CDATA[IT Asset Disposition (ITAD)]]></category>
  43. <category><![CDATA[ITAD]]></category>
  44. <category><![CDATA[Media Sanitization]]></category>
  45. <guid isPermaLink="false">https://cybersecthreat.com/?p=20997</guid>
  46.  
  47. <description><![CDATA[<p>IT Asset Disposition (ITAD) is essential to safeguarding sensitive data when retiring, recycling, or repurposing IT equipment. As organizations expand their digital infrastructure, securely disposing of devices—especially those containing sensitive information—is paramount. This article provides a high-level overview of ITAD, covering the definition, data destruction methods, global standards, and key considerations for secure and compliant...</p>
  48. <p>The post <a href="https://cybersecthreat.com/2024/11/04/it-asset-disposition-itad-a-comprehensive-guide-to-secure-data-destruction/">IT Asset Disposition (ITAD): A Comprehensive Guide to Secure Data Destruction</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  49. ]]></description>
  50. <content:encoded><![CDATA[<p>IT Asset Disposition (ITAD) is essential to safeguarding sensitive data when retiring, recycling, or repurposing IT equipment. As organizations expand their digital infrastructure, securely disposing of devices—especially those containing sensitive information—is paramount. This article provides a high-level overview of ITAD, covering the definition, data destruction methods, global standards, and key considerations for secure and compliant IT asset management.</p><h2 class="wp-block-heading" id="h-what-is-it-asset-disposition-itad">What is IT Asset Disposition (ITAD)?</h2><p>IT Asset Disposition, or ITAD, is the process of securely handling end-of-life IT assets. This includes data-bearing equipment such as computers, servers, storage devices, and network appliances. The purpose of ITAD’s purpose is to ensure sensitive data is thoroughly destroyed to prevent unauthorized access or data leaks. Additionally, ITAD incorporates environmental and sustainability practices, making it part of a broader corporate responsibility strategy.</p><h2 class="wp-block-heading">Methods of Data Destruction in ITAD</h2><p>Data destruction methods for ITAD typically fall into logical and physical categories, each with strengths for different asset conditions and end-of-life strategies.</p><ol class="wp-block-list"><li><strong>Logical Destruction (Wipe/Erase,  Crypto Erase and Degaussing)</strong><ul class="wp-block-list"><li><strong>Wiping or Erasing</strong>: This method involves using software to overwrite data with zeros, ones, or random patterns at least once, making the original data unreadable. It is commonly applied to fully functional devices intended for resale or recycling. However, wiping cannot reliably remove data from damaged or partially damaged devices, as software-based erasure depends on a fully operational drive to ensure thorough coverage of all disk sectors. A critical challenge with wiping software is the risk of undetected issues within the software itself, such as bugs or vulnerabilities that could prevent complete data erasure. Because software bugs and potential compromises in the wiping software’s supply chain cannot be ruled out, relying on the software to detect its own errors is insufficient. For this reason, verification processes, such as independent data recovery tests, are essential to confirm the effectiveness of the wiping process. Below are some factors that can impact the reliability of software-based wiping:<ul class="wp-block-list"><li><strong>Software Integrity and Supply Chain Risks</strong>: Bugs within the wiping software, potential compromises in the software provider&#8217;s infrastructure, or supply chain vulnerabilities could all lead to wiping tools that fail to erase data.</li>
  51.  
  52. <li><strong>Device Security Concerns</strong>: Compromised devices &#8211; especially those affected by kernel-level malware or CMOS-level viruses &#8211; may prevent wiping software from functioning correctly. Additionally, CMOS-level malware can interfere with USB-booted wiping software, even pretending to complete the wiping processes.</li>
  53.  
  54. <li><strong>Device Support and Technological Advancements</strong>: Many wiping solutions do not natively support devices like routers, switches, or appliances, which requires expert knowledge to support wiping operations. Furthermore, the rapid advancement of SSD and flash storage technology has outpaced research, leading to uncertainty regarding effective wiping methods and the exact number of passes needed to ensure complete data erasure for newer storage media.</li>
  55.  
  56. <li><strong>Wiping Process Uncertainty</strong>: Various wiping standards, such as the Peter Gutmann 35-pass method, were developed based on research showing that, after multiple overwrites, no data could be recovered even in a laboratory environment. However, the effectiveness of wiping software cannot be guaranteed due to numerous factors, including variations in hardware design, firmware inconsistencies, and mechanical limitations. These variables mean that even highly reputable wiping methods may not ensure complete data removal, particularly on newer or complex storage devices.</li></ul></li>
  57.  
  58. <li><strong>Cryptographic Erasure</strong>: also known as Crypto Erase, involves leaving the encrypted data on the device intact while securely erasing only the encryption keys. This approach operates on the premise that, without the encryption keys, decrypting the data would take an impractically long time—even with advanced hardware—thanks to the robustness of modern encryption algorithms. The security of Crypto Erase hinges on the infeasibility of brute-forcing the encryption key within a reasonable timeframe, making it an effective and efficient method for data erasure. This technique is particularly valuable for self-encrypting drives (SEDs) and other devices that support native encryption. While brute-forcing an encryption key theoretically could be expedited by chaining together powerful hardware—such as 200,000 Nvidia H200 GPUs—it remains highly impractical with current technology. However, the only certainty is the uncertainty of future advancements in computational speed. For instance, connecting multiple quantum computers at high speed could dramatically change the landscape. As hardware continues to evolve, faster and more efficient processing may eventually challenge the assumptions that underpin Cryptographic Erasure’s security. This evolving landscape underscores the need for ongoing assessment of data erasure methods to ensure long-term data security.</li>
  59.  
  60. <li><strong>Degaussing</strong>: Degaussing erases data on magnetic storage devices, such as hard drives and tapes, by applying a strong magnetic field that disrupts their magnetic alignment. This method can also be applied to damaged or partially damaged devices. For degaussing to be effective, the magnetic force generated by the degausser—measured in Oersteds (Oe)—must exceed the coercivity of the storage media being erased. Although degaussing is highly effective for magnetic media, it renders the device unusable and cannot be applied to solid-state drives (SSDs) or other flash-based storage. One limitation of degaussing is that it leaves no visible evidence that can be observed by the naked eye, making it difficult to confirm that the degausser worked properly for each device and that the operator actually placed the disk into the degausser for the degaussing process. Although some degaussers come with built-in measurements displaying the Oe level produced every time, a more robust approach is to use third-party verification technology to confirm that the degausser functioned correctly and the disk was indeed processed. This added verification provides valuable assurance in environments where strict documentation of successful data destruction is required.</li></ul></li>
  61.  
  62. <li><strong>Physical Destruction (Shredding, Grinding, Disintegrating, Pulverize, Drill/Punch Hole, Crushing)</strong><ul class="wp-block-list"><li>Physical destruction makes data irretrievable by physically altering the storage media through techniques such as shredding, grinding, disintegrating, pulverizing, drilling/punching holes, and crushing. These methods render the storage device completely inoperable. They are especially useful for damaged or partially damaged devices where logical erasure isn’t possible, or when compliance with specific standards or regulatory requirements is necessary. Standards such as EN 15713 and ISO/IEC 21964 provide guidelines on shredding particle sizes according to the data&#8217;s sensitivity level, offering valuable reference points for ITAD processes that employ physical destruction. For flash storage media, it’s essential to verify that every memory chip has been destroyed—not just the main circuit board—to prevent potential data recovery through chip-off techniques.</li></ul></li></ol><h2 class="wp-block-heading" id="h-the-world-s-most-widely-referenced-data-destruction-standard">The world&#8217;s most widely referenced data destruction standard</h2><p>Several international standards guide organizations in implementing secure, compliant data destruction methods:</p><ul class="wp-block-list"><li><strong>ISO/IEC 27001:2013 and ISO/IEC 27001:2022</strong>: These widely adopted standards provide a comprehensive framework for information security management, including data destruction processes within a broader security policy. The 2022 revision introduces updated control sets to address emerging technologies and evolving threats. One notable addition is Annex A 8.10, which mandates, “Information stored in information systems, devices, or in any other storage media shall be deleted when no longer required.” This specific control underscores the importance of securely deleting data from all media to prevent unauthorized access or misuse when data is no longer needed.</li>
  63.  
  64. <li><strong>DoD 5220.22-M</strong>: also known as the National Industrial Security Program Operating Manual (NISPOM), was frequently cited as a data sanitization standard in its early days, largely due to few other data destruction standards existed at that moment. The manual itself contains only limited information regarding data sanitization, with two paragraphs addressing it directly. In practice, the data destruction industry has combined elements from DoD 5220.22-M, various DoD memos, and the Defense Security Service’s (DSS) Clearing and Sanitization Matrix (C&amp;SM) to form what is commonly referred to as the “DoD 5220.22-M standard,” which includes the well-known DoD 3-pass and DoD 7-pass overwriting methods. However, as of the June 2007 edition of the DSS C&amp;SM, it explicitly mentioned that &#8220;overwriting is no longer acceptable for sanitization of magnetic media; only degaussing or physical destruction is acceptable&#8221;.</li>
  65.  
  66. <li><strong>NIST Special Publication 800-88 Revision 1</strong>: NIST 800-88 is a U.S.-based guideline for media sanitization, specifying approved methods for data sanitization based on media types. It offers clear protocols for wiping, degaussing, and physical destruction, catering to a wide range of data sensitivity levels.</li>
  67.  
  68. <li><strong>DIN 66399</strong>: This German standard categorizes media types and specifies physical destruction methods according to security levels, aligning destruction techniques with data sensitivity by defining particle sizes for various storage media.</li>
  69.  
  70. <li><strong>EN 15713:2009 and EN 15713:2023</strong>: European standards focus exclusively on the &#8220;Secure destruction of confidential and sensitive material,&#8221; detailing operational requirements for secure destruction processes applicable to facilities handling confidential data. These standards serve as an excellent reference for data destruction practices, particularly for companies operating in Europe, processing European data or personally identifiable information (PII), or those required to comply with GDPR regulations.</li>
  71.  
  72. <li><strong>ISO/IEC 21964:2018</strong>: ISO/IEC 21964:2018, commonly referred to as the Data Destruction Standard, establishes guidelines for secure physical destruction, categorizing shredding methods based on particle size for various storage media. This standard closely aligns with EN 15713 in many aspects and can be viewed as an international counterpart to EN 15713.</li></ul><h2 class="wp-block-heading" id="h-additional-standards-and-certifications-of-itad">Additional Standards and Certifications of ITAD</h2><p>Beyond core global and well-known ITAD standards, additional certifications support data security, compliance, and sustainability:</p><ul class="wp-block-list"><li><strong>NPSA Standards (formerly CPNI)</strong>: The UK&#8217;s National Protective Security Authority provides secure handling and destruction guidelines for sensitive information, particularly relevant to the public sector.</li>
  73.  
  74. <li><strong><a href="https://www.nsa.gov/Resources/Media-Destruction-Guidance/NSA-Evaluated-Products-Lists-EPLs/">NSA Evaluated Products Lists (EPLs)</a></strong>: The NSA’s Evaluated Products List includes certified data destruction equipment for government-level security in the U.S., such as approved shredders and degaussers.</li>
  75.  
  76. <li><strong>NAID AAA Certification</strong>: Managed by the National Association for Information Destruction, NAID AAA certifies service providers’ secure data destruction practices and subjects them to routine audits.</li></ul><h2 class="wp-block-heading">Key Considerations for Effective ITAD</h2><p>A comprehensive ITAD strategy must consider security, compliance, and sustainability, addressing factors critical to data security and environmental responsibility.</p><ol class="wp-block-list"><li><strong>Environmental, Social, and Governance (ESG) Impact</strong><ul class="wp-block-list"><li>Sustainable ITAD practices help reduce carbon emissions and waste. Certifications like <strong>R2 (Responsible Recycling)</strong> and <strong>e-Stewards</strong> require certified recyclers to adhere to strict environmental practices, ensuring the responsible recycling or disposal of e-waste.</li></ul></li>
  77.  
  78. <li><strong>Device Coverage: What Data Should Be Destroyed?</strong><ul class="wp-block-list"><li>ITAD must cover all data-bearing devices, including hard drives, SSD, NVMe, mobile phones, tablets, Smart Cards/Chip Cards, SIM cards, digital door locks, electronic key cards, RAID controllers, TPM, copy, print, fax, and multifunction machines, Video Conferencing System, networking devices (e.g. routers, switches, Wireless LAN Controller/WLC, Wireless Access Point/WAP, and load balancers), and hardware appliances (e.g. RADIUS/ TACACS+, Hardware Security Module(HSM), IDS/IPS, proxy, etc). Each type of device can store access permission, configuration files, logs, PII, and sensitive information, requiring careful attention to prevent unauthorized access.</li></ul></li>
  79.  
  80. <li><strong>Consideration of New Media Types</strong><ul class="wp-block-list"><li>Flash media technology continues to evolve, with advancements such as SLC (Single-Level Cell), MLC (Multi-Level Cell), TLC (Triple-Level Cell), QLC (Quad-Level Cell), and 3D NAND. These developments introduce significant uncertainty when using software wiping methods, as the effectiveness of data erasure can vary depending on the specific technology and its underlying architecture.</li></ul></li>
  81.  
  82. <li><strong>Local Regulations and Compliance</strong><ul class="wp-block-list"><li>Compliance with local regulations, like the General Data Protection Regulation (GDPR) in the European Union, is essential. GDPR violations, such as inadequate data destruction, can result in substantial fines—up to 4% of a company’s annual global turnover. Any media storing data of EU citizens falls under the GDPR’s scope, regardless of the media’s location. Understanding the regulatory environment where assets are located is key to ensuring compliant ITAD practices and mitigating financial risks.</li></ul></li>
  83.  
  84. <li><strong>Working with Certified ITAD Vendors</strong><ul class="wp-block-list"><li>Certified ITAD vendors provide assurance of data destruction competency, adhering to industry best practices and standards. Look for vendors with skilled security professionals, such as data recovery experts and <a href="https://cybersecthreat.com/product/vnr/">chip-off recovery technology</a> experts, who can assess destruction needs and apply the appropriate destruction levels. Certified vendors also offer repeatable, auditable processes, using certified equipment for consistent, reliable results.</li></ul></li>
  85.  
  86. <li><strong>Repeatable and Certified Processes and Equipment</strong><ul class="wp-block-list"><li>Certified destruction equipment and standardized processes, such as NSA EPL-approved shredders or degaussers, ensure consistency and compliance in data destruction efforts. To meet security standards, organizations should define clear guidelines that align data sensitivity levels and media types with appropriate destruction methods. Verification protocols must also be established, specifying inspection percentages by device type and setting standards for the extent of damage required to ensure that all memory cells, chips, and magnetic strips are rendered unrecoverable. Responsibilities and requirements should be clearly defined. </li></ul></li>
  87.  
  88. <li><strong>Clearly Defined Responsibilities and Requirements for Each Party</strong><ul class="wp-block-list"><li>Responsibilities and requirements should be clearly defined to ensure accountability throughout the ITAD process. For instance, ITAD providers might hold certifications like ISO 27001 or equivalent data destruction credentials and be responsible for logistics, media verification, and conducting destruction procedures. Internal teams might manage documentation of logistics and destruction requirements, classify media by sensitivity, maintain serial number records, oversee on-site destruction, and verify adherence to established standards. They could also set timeframes for destruction after device decommissioning and establish deadlines for ITAD providers to complete destruction and provide certificates and reports.</li></ul></li>
  89.  
  90. <li><strong>Detailed Verification and Auditing</strong><ul class="wp-block-list"><li>Verification steps, such as conducting in-depth data recovery tests on every disk using different third-party recovery software, using <a href="https://cybersecthreat.com/patented-degauss-verification-magnetic-sticker/">Degauss Verification Technology</a> on every magnetic media, monitoring magnetic force for every operation, verifying required shredded particle sizes, and detailed inspecting destruction levels, providing evidence of data security. Comprehensive audits and certifications help organizations maintain a clear, documented chain of custody, confirming that data destruction meets regulatory and security standards.</li></ul></li>
  91.  
  92. <li><strong>Logistics Risk Management</strong><ul class="wp-block-list"><li>To minimize risks during transport, consider on-site destruction or using GPS-tracked, lockable trucks with additional security measures, such as lockable logistic containers, black shrink-wrap, tamper-evident serialized tape, and tamper-evident seals. These precautions protect data integrity and help prevent unauthorized access throughout the logistics process.</li></ul></li>
  93.  
  94. <li><strong>Multi-Step Destruction / Dual-Layer Safety / Defense-in-Depth Protection</strong><ul class="wp-block-list"><li>Combining multiple layers of protection ensures data security. For example, magnetic media should be degaussed on the same day upon decommissioning or damage, then securely locked until the next scheduled ITAD process for final on-site physical destruction, supported by a secure logistics and monitoring process, creating a defense-in-depth strategy.</li></ul></li></ol><h2 class="wp-block-heading">Conclusion</h2><p>Implementing a secure, compliant, and environmentally responsible ITAD process is essential in today’s data-sensitive and eco-conscious world. Following established standards, working with certified vendors, and using certified processes and equipment ensure effective data destruction and regulatory compliance. A well-defined ITAD program not only safeguards against data breaches but also supports ESG initiatives, promoting sustainability and responsible asset disposal in an increasingly connected and environmentally aware society.</p><p></p><p>The post <a href="https://cybersecthreat.com/2024/11/04/it-asset-disposition-itad-a-comprehensive-guide-to-secure-data-destruction/">IT Asset Disposition (ITAD): A Comprehensive Guide to Secure Data Destruction</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  95. ]]></content:encoded>
  96. <wfw:commentRss>https://cybersecthreat.com/2024/11/04/it-asset-disposition-itad-a-comprehensive-guide-to-secure-data-destruction/feed/</wfw:commentRss>
  97. <slash:comments>0</slash:comments>
  98. </item>
  99. <item>
  100. <title>AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar</title>
  101. <link>https://cybersecthreat.com/2024/05/04/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar/</link>
  102. <dc:creator><![CDATA[CyberSecThreat Editor Team]]></dc:creator>
  103. <pubDate>Fri, 03 May 2024 18:09:54 +0000</pubDate>
  104. <category><![CDATA[AI Security]]></category>
  105. <category><![CDATA[Events]]></category>
  106. <category><![CDATA[News]]></category>
  107. <category><![CDATA[Security Awareness Training]]></category>
  108. <category><![CDATA[news]]></category>
  109. <guid isPermaLink="false">https://cybersecthreat.com/?p=20651</guid>
  110.  
  111. <description><![CDATA[<p>We are thrilled to invite you to the AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar, scheduled for 14th June at noon GMT+8. Overview: In today&#8217;s rapidly evolving digital landscape, the intersection of Cyber Security and Artificial Intelligence presents both unprecedented opportunities and challenges. As AI technologies continue to advance, they...</p>
  112. <p>The post <a href="https://cybersecthreat.com/2024/05/04/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar/">AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  113. ]]></description>
  114. <content:encoded><![CDATA[<p class="kt-adv-heading20651_d5bd69-2a wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_d5bd69-2a">We are thrilled to invite you to the AKO Labs Master Class Series &#8211; <strong>Cyber Awareness in AI Dangers</strong> webinar, scheduled for 14th June at noon GMT+8.</p><p class="kt-adv-heading20651_8eb4ce-07 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_8eb4ce-07"><strong>Overview:</strong></p><p class="kt-adv-heading20651_f7da68-82 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_f7da68-82">In today&#8217;s rapidly evolving digital landscape, the intersection of Cyber Security and Artificial Intelligence presents both unprecedented opportunities and challenges. As AI technologies continue to advance, they introduce new vulnerabilities and threats that can compromise data integrity, privacy, and security on a global scale. This webinar aims to shed light on the intricate relationship between Cyber Security and AI, exploring the potential dangers posed by AI-driven cyber-attacks and strategies to mitigate these risks effectively.</p><p class="kt-adv-heading20651_12a5b5-a8 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_12a5b5-a8"><strong>Synopsis:</strong></p><div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20651_e78261-f0 kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_26ed1e-76"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Introduction to Cyber Awareness &amp; AI: Understanding the fundamentals and the growing significance of Cyber Awareness in AI.</span></li>
  115.  
  116. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_12020b-9e"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">AI-Driven Cyber Threats: Exploring the latest trends in AI-powered cyber-attacks, including deep fakes, adversarial attacks, and autonomous malware.</span></li>
  117.  
  118. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_c3a06e-ce"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Case Studies: Analysing real-world examples of AI-related security breaches and their implications.</span></li>
  119.  
  120. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_eb31bc-5c"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Mitigating AI Risks: Strategies and best practices for safeguarding organisations against AI-driven cyber threats.</span></li>
  121.  
  122. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_a3ad54-08"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Future Outlook: Anticipating the future of Cyber Security in the age of AI and the evolving threat landscape.</span></li></ul></div><p class="kt-adv-heading20651_e6a694-88 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_e6a694-88"><strong>Guest Speaker:</strong></p><div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20651_f0dec1-e5 kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_2c8a1d-9d"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Mr. Tee Soo Kiat is a seasoned Cybersecurity professional with over 25 years of experience in the field. He has held various roles in both public and private sectors, gaining valuable insights into the complexities of cybersecurity challenges and solutions.  </span></li>
  123.  
  124. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_94fa16-a1"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Soo Kiat holds a Bachelor of Engineering (Electronics and Communication), University of Birmingham. </span></li></ul></div><p class="kt-adv-heading20651_ca06f5-0b wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_ca06f5-0b"><strong>Why Attend?</strong></p><div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20651_c0a14b-25 kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_b0b091-2c"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Gain insights into the latest AI-driven cyber threats and their potential impact on organisations.</span></li>
  125.  
  126. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_08f67a-46"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Learn strategies and best practices to enhance Cyber Security in the era of AI.</span></li>
  127.  
  128. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_612661-f7"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Network with industry experts, thought leaders, and peers to exchange ideas and experiences.</span></li>
  129.  
  130. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_cf5603-c9"><span class="kb-svg-icon-wrap kb-svg-icon-fas_dot-circle kt-svg-icon-list-single"><svg viewBox="0 0 512 512"  fill="currentColor" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm80 248c0 44.112-35.888 80-80 80s-80-35.888-80-80 35.888-80 80-80 80 35.888 80 80z"/></svg></span><span class="kt-svg-icon-list-text">Stay ahead of the curve by understanding the evolving Cyber Security landscape and emerging technologies.</span></li></ul></div><p class="kt-adv-heading20651_a90efc-f7 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_a90efc-f7">Don&#8217;t miss this opportunity to expand your knowledge and stay updated on the latest developments in Cyber Security and AI. Secure your spot today and join us for an engaging and insightful session.</p><div class="kb-row-layout-wrap kb-row-layout-id20651_bf324b-ad alignnone kt-row-has-bg wp-block-kadence-rowlayout"><div class="kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top">
  131. <div class="wp-block-kadence-column kadence-column20651_d2c1d2-37"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading20651_9b4595-95 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_9b4595-95">Event Detail</h2>
  132.  
  133. <div class="wp-block-kadence-spacer aligncenter kt-block-spacer-20651_92dec3-57"><div class="kt-block-spacer kt-block-spacer-halign-center"><hr class="kt-divider"/></div></div>
  134.  
  135. <div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items20651_7c6457-31 kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_f7d8b7-96"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Suitable for</strong>: CXO, CISO &amp; Information Security Management and Professional</span></li>
  136.  
  137. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_8bbe33-a6"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Date</strong>: Fri, 14 Jun 2024 12:00 Taiwan Time</span></li>
  138.  
  139. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-20651_c9e845-78"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text">Registration Link: <a href="#RegistrationForm" target="_blank" rel="noreferrer noopener">Click here to register</a></span></li></ul></div></div></div>
  140. </div></div><p class="kt-adv-heading20651_0cc5b3-b3 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_0cc5b3-b3">Please register to ensure your place at this exclusive event. Should you have any questions or require further information, please feel free to contact me at below mentioned contact details. We look forward to welcoming you to the AKO Labs Master Class Series &#8211; ‘Cyber Awareness &amp; AI Dangers’ webinar.</p><div class="kb-row-layout-wrap kb-row-layout-id20651_e932a3-ff alignnone wp-block-kadence-rowlayout"><div class="kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top">
  141. <div class="wp-block-kadence-column kadence-column20651_6a985f-47"><div class="kt-inside-inner-col"><h2 id="RegistrationForm" class="kt-adv-heading20651_5f57cd-a0 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20651_5f57cd-a0">Registration Form</h2>
  142.  
  143. <div class="wp-block-kadence-spacer aligncenter kt-block-spacer-20651_39e001-cb"><div class="kt-block-spacer kt-block-spacer-halign-center"><hr class="kt-divider"/></div></div>
  144.  
  145. <style id="wpforms-css-vars-root">
  146. :root {
  147. --wpforms-field-border-radius: 3px;
  148. --wpforms-field-border-style: solid;
  149. --wpforms-field-border-size: 1px;
  150. --wpforms-field-background-color: #ffffff;
  151. --wpforms-field-border-color: rgba( 0, 0, 0, 0.25 );
  152. --wpforms-field-border-color-spare: rgba( 0, 0, 0, 0.25 );
  153. --wpforms-field-text-color: rgba( 0, 0, 0, 0.7 );
  154. --wpforms-field-menu-color: #ffffff;
  155. --wpforms-label-color: rgba( 0, 0, 0, 0.85 );
  156. --wpforms-label-sublabel-color: rgba( 0, 0, 0, 0.55 );
  157. --wpforms-label-error-color: #d63637;
  158. --wpforms-button-border-radius: 3px;
  159. --wpforms-button-border-style: none;
  160. --wpforms-button-border-size: 1px;
  161. --wpforms-button-background-color: #066aab;
  162. --wpforms-button-border-color: #066aab;
  163. --wpforms-button-text-color: #ffffff;
  164. --wpforms-page-break-color: #066aab;
  165. --wpforms-background-image: none;
  166. --wpforms-background-position: center center;
  167. --wpforms-background-repeat: no-repeat;
  168. --wpforms-background-size: cover;
  169. --wpforms-background-width: 100px;
  170. --wpforms-background-height: 100px;
  171. --wpforms-background-color: rgba( 0, 0, 0, 0 );
  172. --wpforms-background-url: none;
  173. --wpforms-container-padding: 0px;
  174. --wpforms-container-border-style: none;
  175. --wpforms-container-border-width: 1px;
  176. --wpforms-container-border-color: #000000;
  177. --wpforms-container-border-radius: 3px;
  178. --wpforms-field-size-input-height: 43px;
  179. --wpforms-field-size-input-spacing: 15px;
  180. --wpforms-field-size-font-size: 16px;
  181. --wpforms-field-size-line-height: 19px;
  182. --wpforms-field-size-padding-h: 14px;
  183. --wpforms-field-size-checkbox-size: 16px;
  184. --wpforms-field-size-sublabel-spacing: 5px;
  185. --wpforms-field-size-icon-size: 1;
  186. --wpforms-label-size-font-size: 16px;
  187. --wpforms-label-size-line-height: 19px;
  188. --wpforms-label-size-sublabel-font-size: 14px;
  189. --wpforms-label-size-sublabel-line-height: 17px;
  190. --wpforms-button-size-font-size: 17px;
  191. --wpforms-button-size-height: 41px;
  192. --wpforms-button-size-padding-h: 15px;
  193. --wpforms-button-size-margin-top: 10px;
  194. --wpforms-container-shadow-size-box-shadow: none;
  195.  
  196. }
  197. </style><style id="wpforms-css-vars-20633-block-ac14afdf-6551-4cd0-9e24-f9be5f07526c">
  198. #wpforms-20633.wpforms-block-ac14afdf-6551-4cd0-9e24-f9be5f07526c {
  199. --wpforms-field-size-input-height: 50px;
  200. --wpforms-field-size-input-spacing: 20px;
  201. --wpforms-field-size-font-size: 18px;
  202. --wpforms-field-size-line-height: 21px;
  203. --wpforms-field-size-padding-h: 14px;
  204. --wpforms-field-size-checkbox-size: 18px;
  205. --wpforms-field-size-sublabel-spacing: 10px;
  206. --wpforms-field-size-icon-size: 1.25;
  207. --wpforms-label-size-font-size: 16px;
  208. --wpforms-label-size-line-height: 19px;
  209. --wpforms-label-size-sublabel-font-size: 14px;
  210. --wpforms-label-size-sublabel-line-height: 17px;
  211. --wpforms-button-size-font-size: 17px;
  212. --wpforms-button-size-height: 41px;
  213. --wpforms-button-size-padding-h: 15px;
  214. --wpforms-button-size-margin-top: 10px;
  215. --wpforms-container-shadow-size-box-shadow: none;
  216.  
  217. }
  218. </style><div class="wpforms-container wpforms-container-full wpforms-block wpforms-block-ac14afdf-6551-4cd0-9e24-f9be5f07526c wpforms-render-modern" id="wpforms-20633"><form id="wpforms-form-20633" class="wpforms-validate wpforms-form wpforms-ajax-form" data-formid="20633" method="post" enctype="multipart/form-data" action="/feed/" data-token="7dca8b1cdf6b6bacb09b1f2b5cbf392d" data-token-time="1733107992"><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-hidden" id="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</div><div class="wpforms-field-container"><div id="wpforms-20633-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><fieldset><legend class="wpforms-field-label">Name &amp; Surname <span class="wpforms-required-label" aria-hidden="true">*</span></legend><div class="wpforms-field-row wpforms-field-large"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-20633-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" placeholder="First Name" aria-errormessage="wpforms-20633-field_0-error" required><label for="wpforms-20633-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-20633-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" placeholder="Last Name" aria-errormessage="wpforms-20633-field_0-last-error" required><label for="wpforms-20633-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></fieldset></div><div id="wpforms-20633-field_14-container" class="wpforms-field wpforms-field-text" data-field-id="14"><label class="wpforms-field-label" for="wpforms-20633-field_14">Name of Organization <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-20633-field_14" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][14]" aria-errormessage="wpforms-20633-field_14-error" required></div><div id="wpforms-20633-field_15-container" class="wpforms-field wpforms-field-text" data-field-id="15"><label class="wpforms-field-label" for="wpforms-20633-field_15">Department <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-20633-field_15" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][15]" aria-errormessage="wpforms-20633-field_15-error" required></div><div id="wpforms-20633-field_16-container" class="wpforms-field wpforms-field-text" data-field-id="16"><label class="wpforms-field-label" for="wpforms-20633-field_16">Job Position <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-20633-field_16" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][16]" aria-errormessage="wpforms-20633-field_16-error" required></div><div id="wpforms-20633-field_20-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="20"><label class="wpforms-field-label" for="wpforms-20633-field_20">Does your organization have a SOC / SIEM? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-20633-field_20" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][20]" required="required"><option value="" class="placeholder" disabled >Does your organization have a SOC / SIEM?</option><option value="Yes (Internal)" >Yes (Internal)</option><option value="Yes (Outsourced)" >Yes (Outsourced)</option><option value="No"  selected='selected'>No</option></select></div><div id="wpforms-20633-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-20633-field_1">Business E-mail <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="email" id="wpforms-20633-field_1" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][1]" placeholder="Only accept Business E-mail" spellcheck="false" aria-errormessage="wpforms-20633-field_1-error" required></div><div id="wpforms-20633-field_4-container" class="wpforms-field wpforms-field-phone" data-field-id="4"><label class="wpforms-field-label" for="wpforms-20633-field_4">Mobile Number <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="tel" id="wpforms-20633-field_4" class="wpforms-field-large wpforms-field-required wpforms-smart-phone-field" data-rule-smart-phone-field="true" name="wpforms[fields][4]" placeholder="0933-1230456" aria-label="Mobile Number" aria-errormessage="wpforms-20633-field_4-error" required></div><div id="wpforms-20633-field_27-container" class="wpforms-field wpforms-field-text" data-field-id="27"><label class="wpforms-field-label" for="wpforms-20633-field_27">Phone <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-20633-field_27" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][27]" placeholder="02-22223333#456" aria-errormessage="wpforms-20633-field_27-error" required></div><div id="wpforms-20633-field_29-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="29"><label class="wpforms-field-label" for="wpforms-20633-field_29">How did you know about this event? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-20633-field_29" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][29]" required="required"><option value="" class="placeholder" disabled  selected='selected'>How did you know about this event?</option><option value="Facebook" >Facebook</option><option value="LinkedIn" >LinkedIn</option><option value="Twitter" >Twitter</option><option value="Line" >Line</option><option value="Reseller" >Reseller</option><option value="E-mail Newsletter" >E-mail Newsletter</option><option value="Sales Representative of CyberSecThreat" >Sales Representative of CyberSecThreat</option><option value="Others" >Others</option></select></div><div id="wpforms-20633-field_25-container" class="wpforms-field wpforms-field-text" data-field-id="25"><label class="wpforms-field-label" for="wpforms-20633-field_25">Business Contact Person</label><input type="text" id="wpforms-20633-field_25" class="wpforms-field-large" name="wpforms[fields][25]" placeholder="Name of Business + Name" aria-errormessage="wpforms-20633-field_25-error" ></div><div id="wpforms-20633-field_30-container" class="wpforms-field wpforms-field-text" data-field-id="30"><label class="wpforms-field-label" for="wpforms-20633-field_30">Country <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-20633-field_30" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][30]" placeholder="Please input your country" aria-errormessage="wpforms-20633-field_30-error" required></div><div id="wpforms-20633-field_26-container" class="wpforms-field wpforms-field-gdpr-checkbox" data-field-id="26"><label class="wpforms-field-label">GDPR Agreement <span class="wpforms-required-label" aria-hidden="true">*</span></label><ul id="wpforms-20633-field_26" class="wpforms-field-required"><li class="choice-1"><input type="checkbox" id="wpforms-20633-field_26_1" name="wpforms[fields][26][]" value="I consent to having this website store my submitted information so they can respond to my inquiry." aria-errormessage="wpforms-20633-field_26_1-error" required ><label class="wpforms-field-label-inline" for="wpforms-20633-field_26_1">I consent to having this website store my submitted information so they can respond to my inquiry.</label></li></ul></div></div><!-- .wpforms-field-container --><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="20633"><input type="hidden" name="page_title" value=""><input type="hidden" name="page_url" value="https://cybersecthreat.com/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-20633" class="wpforms-submit" data-alt-text="Sending registration information..." data-submit-text="Submit registration information" aria-live="assertive" value="wpforms-submit">Submit registration information</button><img decoding="async" src="https://cybersecthreat.com/wp-content/plugins/wpforms/assets/images/submit-spin.svg" class="wpforms-submit-spinner" style="display: none;" width="26" height="26" alt="Loading"></div></form></div>  <!-- .wpforms-container --></div></div>
  219. </div></div><p>The post <a href="https://cybersecthreat.com/2024/05/04/ako-labs-master-class-series-cyber-awareness-in-ai-dangers-webinar/">AKO Labs Master Class Series &#8211; Cyber Awareness in AI Dangers webinar</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  220. ]]></content:encoded>
  221. </item>
  222. <item>
  223. <title>CYBERSEC 2024: The Past, Present, and Future of Automation</title>
  224. <link>https://cybersecthreat.com/2024/05/03/cybersec-2024-the-past-present-and-future-of-automation/</link>
  225. <comments>https://cybersecthreat.com/2024/05/03/cybersec-2024-the-past-present-and-future-of-automation/#respond</comments>
  226. <dc:creator><![CDATA[CyberSecThreat Editor Team]]></dc:creator>
  227. <pubDate>Fri, 03 May 2024 12:24:48 +0000</pubDate>
  228. <category><![CDATA[AI Security]]></category>
  229. <category><![CDATA[Events]]></category>
  230. <category><![CDATA[Hyperautomation]]></category>
  231. <category><![CDATA[News]]></category>
  232. <category><![CDATA[SOAR]]></category>
  233. <category><![CDATA[Zero Trust]]></category>
  234. <category><![CDATA[AI]]></category>
  235. <category><![CDATA[GPT]]></category>
  236. <guid isPermaLink="false">https://cybersecthreat.com/?p=20605</guid>
  237.  
  238. <description><![CDATA[<p>Unveiling the Tapestry of Automation: A CYBERSEC 2024 Spotlight&#160;Featuring KhaiChen Wong of Swimlane Inc. At CyberSecThreat, we are at the forefront of deciphering the intricate dance between technology and security. This year, we are honored to collaborate with Swimlane to present a thought-provoking session on “The Past, Present, and Future of Automation” at the CYBERSEC 2024 Exhibition Event. A...</p>
  239. <p>The post <a href="https://cybersecthreat.com/2024/05/03/cybersec-2024-the-past-present-and-future-of-automation/">CYBERSEC 2024: The Past, Present, and Future of Automation</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  240. ]]></description>
  241. <content:encoded><![CDATA[<p class="kt-adv-heading20605_b80954-30 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_b80954-30"><strong>Unveiling the Tapestry of Automation: A CYBERSEC 2024 Spotlight</strong>&nbsp;<em>Featuring KhaiChen Wong of Swimlane Inc.</em></p><p class="kt-adv-heading20605_c7ca12-30 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_c7ca12-30">At <strong>CyberSecThreat</strong>, we are at the forefront of deciphering the intricate dance between technology and security. This year, we are honored to collaborate with <strong>Swimlane</strong> to present a thought-provoking session on “The Past, Present, and Future of Automation” at the CYBERSEC 2024 Exhibition Event.</p><h2 class="kt-adv-heading20605_2fc6b9-5a wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_2fc6b9-5a"><strong>A Voyage Through Time</strong></h2><p class="kt-adv-heading20605_bd734a-5f wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_bd734a-5f">Our distinguished guest speaker, KhaiChen Wong, Solutions Engineering, APAC at Swimlane Inc., will guide us through automation’s transformative journey. From its nascent stages in early industry to its current role as a pivotal force in modern enterprises, automation has reshaped the landscape of work. We will explore its evolution, celebrate its triumphs, and learn from its challenges.</p><h2 class="kt-adv-heading20605_83ac67-13 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_83ac67-13"><strong>The Present: A Delicate Equilibrium</strong></h2><p class="kt-adv-heading20605_247093-d4 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_247093-d4">In today’s digital ecosystem, organizations strive to harness automation’s potential to streamline workflows and enhance efficiency. Yet, the advent of autonomous and public AI-driven technologies presents a complex puzzle. Our session will delve into the art of leveraging automation to elevate human potential without succumbing to the pitfalls of over-reliance on AI.</p><h2 class="kt-adv-heading20605_66731a-3e wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_66731a-3e"><strong>The Future: Charting Uncharted Waters</strong></h2><p class="kt-adv-heading20605_8e10c8-61 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_8e10c8-61">As we peer into the future, we envision a world where automation not only simplifies tasks but also inspires innovation. KhaiChen Wong will share insights into emerging trends and predict how automation will continue to revolutionize industries, redefine roles, and reshape our approach to work.</p><h2 class="kt-adv-heading20605_777299-90 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_777299-90"><strong>Confronting the Cyber Frontier</strong></h2><p class="kt-adv-heading20605_cc0b33-5b wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_cc0b33-5b">The intersection of AI and cybersecurity is fraught with both opportunities and threats. Our exhibition will spotlight adversarial AI’s role in cyber threats, presenting real-world examples and dissecting their implications. Attendees will gain valuable strategies to mitigate these risks, ensuring a secure path forward in the automation landscape.</p><h2 class="kt-adv-heading20605_8dc122-92 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_8dc122-92"><strong>Conclusion: A Call to Action</strong></h2><p class="kt-adv-heading20605_249d17-ad wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading20605_249d17-ad">Join us at&nbsp;<strong><a href="https://cybersec.ithome.com.tw/2024/en/exhibition-page/2177">CYBERSEC 2024</a></strong>&nbsp;as we embark on this enlightening expedition through automation’s past, present, and future. Together, we will arm ourselves with the knowledge and tools to thrive in an era where automation and cybersecurity converge.</p><p><a href="https://signupcybersec.ithome.com.tw/signup/2024/?utm_source=email&amp;utm_medium=edm-sponsor&amp;utm_campaign=%E5%A5%87%E8%B3%87%E8%A8%8A%E4%BF%9D%E5%AE%89">Register Now!</a></p><p>The post <a href="https://cybersecthreat.com/2024/05/03/cybersec-2024-the-past-present-and-future-of-automation/">CYBERSEC 2024: The Past, Present, and Future of Automation</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  242. ]]></content:encoded>
  243. <wfw:commentRss>https://cybersecthreat.com/2024/05/03/cybersec-2024-the-past-present-and-future-of-automation/feed/</wfw:commentRss>
  244. <slash:comments>0</slash:comments>
  245. </item>
  246. <item>
  247. <title>Retrieving Serial Numbers on Magnetic Tape</title>
  248. <link>https://cybersecthreat.com/2023/12/02/unveiling-the-secrets-retrieving-serial-numbers-on-magnetic-tape-for-it-asset-disposition-itad/</link>
  249. <comments>https://cybersecthreat.com/2023/12/02/unveiling-the-secrets-retrieving-serial-numbers-on-magnetic-tape-for-it-asset-disposition-itad/#respond</comments>
  250. <dc:creator><![CDATA[CyberSecThreat Editor Team]]></dc:creator>
  251. <pubDate>Sat, 02 Dec 2023 15:18:58 +0000</pubDate>
  252. <category><![CDATA[Data Destruction]]></category>
  253. <category><![CDATA[Data Disposal]]></category>
  254. <category><![CDATA[Hard Disk Drive Degaussing]]></category>
  255. <category><![CDATA[Hard Disk Drive Destory]]></category>
  256. <category><![CDATA[Hard Disk Drive Destruction]]></category>
  257. <category><![CDATA[Hard Disk Drive Shredding]]></category>
  258. <category><![CDATA[IT Asset Disposition (ITAD)]]></category>
  259. <category><![CDATA[ITAD]]></category>
  260. <category><![CDATA[Media Sanitization]]></category>
  261. <guid isPermaLink="false">https://cybersecthreat.com/?p=11721</guid>
  262.  
  263. <description><![CDATA[<p>The article discusses the significance of retrieving correct serial numbers on magnetic tapes for IT Asset Disposition (ITAD) projects. Various types of serial numbers and methods to read them are explored, emphasizing RFID technology and its frequency characteristics. The information obtained through RFID readers and software utilities assists in efficient tape management, enabling the integration of physical and digital data. Thus, the proper retrieval of serial numbers enhances ITAD tracking and compliance with audit requirements.</p>
  264. <p>The post <a href="https://cybersecthreat.com/2023/12/02/unveiling-the-secrets-retrieving-serial-numbers-on-magnetic-tape-for-it-asset-disposition-itad/">Retrieving Serial Numbers on Magnetic Tape</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  265. ]]></description>
  266. <content:encoded><![CDATA[<h2 class="wp-block-heading" id="h-significance-of-retrieving-correct-serial-numbers-on-magnetic-tape-in-itad-projects">Significance of Retrieving Correct Serial Numbers on Magnetic Tape in ITAD Projects</h2><ul class="wp-block-list"><li><strong>Alignment of Records:</strong> Verify the Serial Numbers on the Magnetic Tape provided by the data owner and confirm the storage media should be destroyed.</li>
  267.  
  268. <li><strong>Unique Identifiers for ITAD Tracking:</strong> Serial Numbers support precise ITAD tracking and auditable records for compliance and reporting requirements.</li></ul><h2 class="wp-block-heading" id="h-introduction">Introduction</h2><p class="has-text-align-left">Magnetic tape cartridges have been integral to data storage for decades, and Linear Tape-Open (LTO) technology stands out prominently. In this exploration, our focus shifts to the world of IT Asset Disposition (ITAD) and the intricacies of deciphering serial numbers from magnetic tapes. LTO, an open standard supported by industry leaders like Hewlett-Packard Enterprise (HPE), IBM, Quantum, Sony, and Fujifilm, offers a spectrum of products, including LTO-5, LTO-6, LTO-7, LTO-8, and LTO-9 tapes, as well as compatible tape drives and libraries.</p><div class="wp-block-kadence-column kadence-column11721_674b90-ca"><div class="kt-inside-inner-col"></div></div><h2 class="wp-block-heading" id="h-different-types-of-magnetic-tape-cartridges-for-digital-data">Different types of Magnetic tape cartridges for Digital Data</h2><ul class="wp-block-list"><li><a href="https://en.wikipedia.org/wiki/Digital_Data_Storage">Digital Data Storage</a>&nbsp;Cassette (DDS)</li>
  269.  
  270. <li><a href="https://en.wikipedia.org/wiki/Data8">Data8</a>&nbsp;cassette, a videocassette derivative by Exabyte</li>
  271.  
  272. <li><a href="https://en.wikipedia.org/wiki/Digital_Tape_Format">Digital Tape Format</a>&nbsp;cassette, developed by Sony (DTF)</li>
  273.  
  274. <li><a href="https://en.wikipedia.org/wiki/Digital_Linear_Tape">Digital Linear Tape</a>&nbsp;cartridge (DLT)</li>
  275.  
  276. <li><a href="https://en.wikipedia.org/wiki/IBM_7340">IBM 7340</a>&nbsp;cartridge, one of the first tape formats packaged in a cassette</li>
  277.  
  278. <li><a href="https://en.wikipedia.org/wiki/Linear_Tape-Open">Linear Tape-Open</a>&nbsp;cartridge (LTO)</li></ul><h2 class="wp-block-heading">Different Types of Serial Numbers on Magnetic Tape:</h2><h3 class="wp-block-heading"><strong>1. Volume Serial Number (Volser)</strong></h3><ul class="wp-block-list"><li><strong>Definition:</strong> Logical identifier within the file system.</li>
  279.  
  280. <li><strong>Purpose:</strong> Facilitates file system organization but lacks details about the physical tape.</li></ul><h3 class="wp-block-heading"><strong>2. Serial Numbers on Magnetic Tape Cartridge</strong></h3><ul class="wp-block-list"><li><strong>Definition:</strong> Non-unique identifier(E.g. Tape&#8217;s batch number) assigned by the manufacturer, often printed on the cartridge.</li>
  281.  
  282. <li><strong>Purpose:</strong> Crucial for physical tracking, inventory management, and batch details.</li></ul><h3 class="wp-block-heading"><strong>3. Serial Number in Memory Chip/Cartridge Memory (RFID)</strong></h3><ul class="wp-block-list"><li><strong>Definition:</strong> Embedded RFID tags contain a unique identifier and additional data in the memory chip/cartridge memory.  </li>
  283.  
  284. <li><strong>Purpose:</strong> Enables electronic tracking; can be read by RFID readers, e.g., Proxmark3 and ACR122U.</li>
  285.  
  286. <li><strong>Note:</strong> Memory Chip/Cartridge Memory may or may not bundled with Magnetic Tape, and may need to be purchased separately.</li></ul><figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="391" src="https://cybersecthreat.com/wp-content/uploads/2023/12/Magnetic-Tape_Cartridge_Memory_Chip_RFID-1024x391.jpg" alt="Magnetic Tape Cartridge Memory Chip RFID" class="wp-image-11800" srcset="https://cybersecthreat.com/wp-content/uploads/2023/12/Magnetic-Tape_Cartridge_Memory_Chip_RFID-1024x391.jpg 1024w, https://cybersecthreat.com/wp-content/uploads/2023/12/Magnetic-Tape_Cartridge_Memory_Chip_RFID-300x114.jpg 300w, https://cybersecthreat.com/wp-content/uploads/2023/12/Magnetic-Tape_Cartridge_Memory_Chip_RFID-768x293.jpg 768w, https://cybersecthreat.com/wp-content/uploads/2023/12/Magnetic-Tape_Cartridge_Memory_Chip_RFID-1536x586.jpg 1536w, https://cybersecthreat.com/wp-content/uploads/2023/12/Magnetic-Tape_Cartridge_Memory_Chip_RFID-18x7.jpg 18w, https://cybersecthreat.com/wp-content/uploads/2023/12/Magnetic-Tape_Cartridge_Memory_Chip_RFID-600x229.jpg 600w, https://cybersecthreat.com/wp-content/uploads/2023/12/Magnetic-Tape_Cartridge_Memory_Chip_RFID.jpg 1816w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Magnetic Tape Cartridge Memory Chip RFID</figcaption></figure><h2 class="wp-block-heading">Methods to read Serial Numbers on Magnetic Tape</h2><h3 class="wp-block-heading"><strong>A. Software Utility</strong></h3><ul class="wp-block-list"><li><strong>Example:</strong> IBM Spectrum Archive Library Edition.</li>
  287.  
  288. <li><strong>Use:</strong> Reads tape serial numbers, aiding in inventory management. Usually, the Manufacturer includes a utility for reading and managing the chip data from LTO tapes and it may not be compatible with the magnetic tape of other vendors.</li></ul><h3 class="wp-block-heading"><strong>B. LCD Display on Tape Drives</strong></h3><ul class="wp-block-list"><li><strong>Example:</strong> Some LTO tape drives.</li>
  289.  
  290. <li><strong>Use:</strong> Displays tape serial numbers directly on the drive.</li></ul><h3 class="wp-block-heading"><strong>C. RFID Readers</strong></h3><ul class="wp-block-list"><li><strong>Capabilities:</strong> Read chip data from LTO cartridges, including serial numbers, usage data, and error logs.</li>
  291.  
  292. <li><strong>Note:</strong> Chip data is stored separately from the RFID label.</li>
  293.  
  294. <li><strong>Common RFID Readers for capturing RFID Tags from cartridge memory:</strong><ul class="wp-block-list"><li><strong>Proxmark3:</strong> Open-source reader for LF (125 kHz) and HF (13.56 MHz) RFID tags.</li>
  295.  
  296. <li><strong>ACR122U:</strong> USB NFC reader/writer operating at 13.56 MHz, designed for smart cards and NFC-enabled devices.</li></ul></li>
  297.  
  298. <li><strong>Combo Readers (ALL-in-one barcode and RFID tag reader):</strong><ul class="wp-block-list"><li>Many RFID tag readers are designed for use in industrial or harsh environments:</li>
  299.  
  300. <li><strong>Examples:</strong><ul class="wp-block-list"><li>Zebra FX9600 RFID Reader (HF and UHF).</li>
  301.  
  302. <li>Alien ALR-H450 Handheld RFID Reader (HF and UHF).</li>
  303.  
  304. <li>Honeywell Granit 1280iFR Barcode Scanner (HF and UHF).</li></ul></li></ul></li></ul><h2 class="wp-block-heading"><strong>Procedures for reading Chip Data from LTO Cartridges:</strong></h2><ul class="wp-block-list"><li><strong>Process:</strong> Connect to a computer via USB or Bluetooth, controlled by computer software.</li>
  305.  
  306. <li><strong>Data Capturing:</strong> Retrieves chip data, distinct from the RFID label.</li>
  307.  
  308. <li><strong>Parsing or Decoding: </strong>Use a supported software tool to parse and decode data.</li></ul><h2 class="wp-block-heading"><strong>Consideration to Read RFID Tags on Multiple Magnetic Tapes simultaneously:</strong></h2><ul class="wp-block-list"><li><strong>Challenge:</strong> Number of readable tags depends on factors like frequency, power output, and tape interference.</li>
  309.  
  310. <li><strong>Experimentation:</strong> Optimal results may require tuning for specific conditions.</li></ul><h2 class="wp-block-heading"><strong>Characteristics and Frequency of Different RFID:</strong></h2><ul class="wp-block-list"><li><strong>Ultra High Frequency (UHF, 300 MHZ to 3 GHz; UHF Gen2 standard systems utilize the 860 to 960 MHz band) RFID Tags:</strong><ul class="wp-block-list"><li><strong>Read range:</strong> Tested with an HP M550 desktop reader, up to 1.5 m (4.9 ft)</li>
  311.  
  312. <li><strong>Example:</strong> Alien Higgs 3 tags.</li>
  313.  
  314. <li>Protocol used for UHF RFID tags (860-960 MHz): EPC Gen2.</li>
  315.  
  316. <li><strong>Interference:</strong> Metal objects and nearby readers.</li></ul></li>
  317.  
  318. <li><strong>High Frequency (HF, 3 to 30 MHz;&nbsp;typically HF systems work at 13.56 MHz) RFID Tags:</strong><ul class="wp-block-list"><li><strong>Read range:</strong> Shorter read range. Tested with an HP M2210 handheld reader, Up to 3 cm. (1.2 in)</li>
  319.  
  320. <li><strong>Example:</strong> Mifare Ultralight C tags</li>
  321.  
  322. <li><strong>Use Case:</strong> Contactless payment systems, access control, and inventory tracking.</li>
  323.  
  324. <li>Protocols used for HF RFID tags (13.56 MHz): ISO 14443 and ISO 15693. </li>
  325.  
  326. <li><strong>Interference:</strong> Metal objects and electronic devices.</li>
  327.  
  328. <li><strong>RFID HF vs. NFC</strong><ul class="wp-block-list"><li>NFC is a subset of RFID technology.</li>
  329.  
  330. <li><strong>Data Transfer Rate:</strong> NFC has a faster rate.</li>
  331.  
  332. <li><strong>Power Supply:</strong> NFC is generally passive(without a power source).</li>
  333.  
  334. <li>Protocols used for NFC tags operating at 13.56 MHz: ISO/IEC 18092 and ISO/IEC 21481</li></ul></li></ul></li>
  335.  
  336. <li><strong>Low Frequency (LF, 30 KHz to&nbsp;300 kHz; typically LF systems work at 125 KHz or 134 kHz)  RFID Tags:</strong><ul class="wp-block-list"><li><strong>Read range:</strong> Longer read range.</li>
  337.  
  338. <li><strong>Use Case:</strong> Animal tracking, vehicle identification, and access control.</li>
  339.  
  340. <li>Protocols used for LF RFID tags (125-134 kHz): ISO 11784 and ISO 11785 standards for animal identification.</li>
  341.  
  342. <li><strong>Interference:</strong> Depends on the specific application.</li></ul></li></ul><h2 class="wp-block-heading">Conclusion</h2><p class="has-text-align-left">Unlocking the secrets of Retrieving Serial Numbers on Magnetic Tape for IT Asset Disposition (ITAD) involves understanding the diverse identifiers and technologies at play. From RFID tags to LTO tape cartridges, the landscape is rich with possibilities. By leveraging RFID readers, and software utilities, organizations can navigate the nuances of tape management, ensuring a seamless integration of physical and digital data. As technology evolves, so does the tapestry of possibilities for efficient and effective data storage.</p><p><strong>Reference:</strong></p><ul class="wp-block-list"><li><a href="https://en.wikipedia.org/wiki/List_of_magnetic_tape_cartridges_and_cassettes">List of Magnetic Tape Cartridges and Cassettes</a></li>
  343.  
  344. <li><a href="https://www.tri-optic.com/media/pdf/WP_barcode.pdf"></a><a href="https://www.tri-optic.com/media/pdf/WP_barcode.pdf">WP Barcode</a></li>
  345.  
  346. <li><a href="https://unix.stackexchange.com/questions/559535/read-the-chip-data-from-lto-tapes">Unix Stack Exchange &#8211; Read the chip data from LTO tapes</a></li>
  347.  
  348. <li><a href="https://community.hpe.com/t5/storeever-tape-storage/ultirum-lto-3-tape-s-serial-number/td-p/5397875#.Y_w1w3ZBy3A">HPE Community &#8211; Ultirum LTO-3 Tape&#8217;s Serial Number</a></li></ul><h2 class="wp-block-heading has-text-align-center" id="h-check-out-our-complete-it-asset-disposition-itad-offering">Check out our complete <a href="https://cybersecthreat.com/itad-service/">IT Asset Disposition (ITAD)</a> offering: </h2><p class="has-text-align-center"><a href="https://cybersecthreat.com/itad-service/">ITAD Service</a></p><p>The post <a href="https://cybersecthreat.com/2023/12/02/unveiling-the-secrets-retrieving-serial-numbers-on-magnetic-tape-for-it-asset-disposition-itad/">Retrieving Serial Numbers on Magnetic Tape</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  349. ]]></content:encoded>
  350. <wfw:commentRss>https://cybersecthreat.com/2023/12/02/unveiling-the-secrets-retrieving-serial-numbers-on-magnetic-tape-for-it-asset-disposition-itad/feed/</wfw:commentRss>
  351. <slash:comments>0</slash:comments>
  352. </item>
  353. <item>
  354. <title>Retrieving and Validating Hard Disk Serial Numbers on Mac</title>
  355. <link>https://cybersecthreat.com/2023/12/01/retrieving-and-validating-hard-disk-serial-numbers-on-mac/</link>
  356. <comments>https://cybersecthreat.com/2023/12/01/retrieving-and-validating-hard-disk-serial-numbers-on-mac/#respond</comments>
  357. <dc:creator><![CDATA[CyberSecThreat Editor Team]]></dc:creator>
  358. <pubDate>Fri, 01 Dec 2023 14:40:44 +0000</pubDate>
  359. <category><![CDATA[Data Destruction]]></category>
  360. <category><![CDATA[Data Disposal]]></category>
  361. <category><![CDATA[Hard Disk Drive Degaussing]]></category>
  362. <category><![CDATA[Hard Disk Drive Destory]]></category>
  363. <category><![CDATA[Hard Disk Drive Destruction]]></category>
  364. <category><![CDATA[Hard Disk Drive Shredding]]></category>
  365. <category><![CDATA[IT Asset Disposition (ITAD)]]></category>
  366. <category><![CDATA[ITAD]]></category>
  367. <category><![CDATA[Media Sanitization]]></category>
  368. <guid isPermaLink="false">https://cybersecthreat.com/?p=11705</guid>
  369.  
  370. <description><![CDATA[<p>The article provides a comprehensive guide to checking hard disk serial numbers on Mac, either through the GUI or Terminal. It details methods applicable for SATA and NVMe drives, and pays particular attention to nuances present in M1 MacBooks with embedded SSDs. The guide underscores the importance of retrieving and validating these serial numbers, notably for Data Destruction and IT Asset Disposition (ITAD) projects, ensuring data security, effective inventory management, and compliance with established standards.</p>
  371. <p>The post <a href="https://cybersecthreat.com/2023/12/01/retrieving-and-validating-hard-disk-serial-numbers-on-mac/">Retrieving and Validating Hard Disk Serial Numbers on Mac</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  372. ]]></description>
  373. <content:encoded><![CDATA[<h2 class="wp-block-heading" id="h-a-comprehensive-technical-guide-to-check-hard-disk-serial-numbers-on-mac">A Comprehensive Technical Guide to check Hard Disk Serial Numbers on Mac</h2><p>As a Mac user, understanding how to retrieve and validate the serial numbers of your hard disk or SSD is crucial, especially in the context of Data Destruction and IT Asset Disposition (ITAD) projects. This comprehensive technical guide explores various methods, both through the graphical user interface (GUI) and the Terminal, to empower you with the skills needed for accurate documentation and secure handling of data.</p><div class="wp-block-kadence-column kadence-column11705_9901d4-40"><div class="kt-inside-inner-col"></div></div><h2 class="wp-block-heading">Using the Graphical User Interface (GUI):</h2><h3 class="wp-block-heading">1. Accessing System Information:</h3><ol class="wp-block-list"><li>Click on the Apple icon in the top-left corner of your screen.</li>
  374.  
  375. <li>Select &#8220;About This Mac&#8221; from the drop-down menu.</li>
  376.  
  377. <li>Click on the &#8220;System Report&#8221; button.</li>
  378.  
  379. <li>In the left-hand sidebar, choose &#8220;Hardware.&#8221;</li>
  380.  
  381. <li>Under &#8220;Hardware,&#8221; select your storage type (SATA/SATA Express, NVMe).</li>
  382.  
  383. <li>Locate the serial number under the &#8220;Serial Number&#8221; column.</li></ol><h2 class="wp-block-heading">Using the Terminal:</h2><h3 class="wp-block-heading">1. Retrieving SATA Hard Disk Serial Numbers:</h3><p>To obtain the serial number of SATA drives, use the <code>system_profiler</code> command. Open your Terminal and enter the following:</p><pre class="wp-block-code"><code><code>system_profiler SPSerialATADataType -detailLevel medium | awk '/Serial/ {print $NF}'</code></code></pre><p>This command provides a detailed output of Serial ATA devices, and the <code>awk</code> command extracts the serial number from the relevant line.</p><h3 class="wp-block-heading">2. Retrieving SATA Drive Serial Numbers (Alternative):</h3><p>For SATA drives, another option is the <code>ioreg</code> command. Execute the following command:</p><pre class="wp-block-code"><code><code>ioreg -rd1 -w0 -c AppleAHCIDiskDriver | grep Serial</code></code></pre><p>This command queries the I/O Kit registry and filters the output to display lines containing &#8220;Serial&#8221; for each SATA disk.</p><h3 class="wp-block-heading">3. Retrieving NVMe Drive Serial Numbers:</h3><p>If you have NVMe drives, use the following command to get the serial number:</p><pre class="wp-block-code"><code><code>ioreg -rd1 -w0 -c IONVMeBlockStorageDevice | grep "Device Characteristics"</code></code></pre><p>This command specifically targets NVMe drives and extracts relevant information, including the serial number.</p><figure class="wp-block-image size-large is-resized"><img decoding="async" width="1024" height="57" src="https://cybersecthreat.com/wp-content/uploads/2023/12/ioreg-mac-command-to-get-harddisk-sn-1024x57.png" alt="Mac Command ioreg to get Hard disk S/N " class="wp-image-11711" style="width:840px;height:auto" srcset="https://cybersecthreat.com/wp-content/uploads/2023/12/ioreg-mac-command-to-get-harddisk-sn-1024x57.png 1024w, https://cybersecthreat.com/wp-content/uploads/2023/12/ioreg-mac-command-to-get-harddisk-sn-300x17.png 300w, https://cybersecthreat.com/wp-content/uploads/2023/12/ioreg-mac-command-to-get-harddisk-sn-768x43.png 768w, https://cybersecthreat.com/wp-content/uploads/2023/12/ioreg-mac-command-to-get-harddisk-sn-18x1.png 18w, https://cybersecthreat.com/wp-content/uploads/2023/12/ioreg-mac-command-to-get-harddisk-sn-600x33.png 600w, https://cybersecthreat.com/wp-content/uploads/2023/12/ioreg-mac-command-to-get-harddisk-sn.png 1153w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Mac Command (ioreg) to get Hard disk S/N </figcaption></figure><h3 class="wp-block-heading">4. Retrieving Serial Numbers for All Drives:</h3><h4 class="wp-block-heading">Open the Terminal:</h4><ul class="wp-block-list"><li>Launch the Terminal application. You can find it in the &#8220;Utilities&#8221; folder within the &#8220;Applications&#8221; directory.</li></ul><h4 class="wp-block-heading">Enter the Command:</h4><ul class="wp-block-list"><li>Type the following command and press Enter: <code>diskutil info /</code></li></ul><h4 class="wp-block-heading">Look for the Serial Number:</h4><ul class="wp-block-list"><li>Scan the information displayed for your hard drive.</li>
  384.  
  385. <li>The &#8220;Serial Number&#8221; field should contain the relevant information.</li></ul><p>Remember that these commands might require administrator privileges, so prepend them with <code>sudo</code> and enter your password when prompted.</p><h2 class="wp-block-heading">Understanding MacBook M1 Series:</h2><p>It&#8217;s crucial to note that MacBook models starting from the M1 series feature a significant change. These all-in-one wonders have embedded SSDs fixed directly onto the motherboard. Interestingly, the physical serial number printed on these embedded SSDs may differ from the serial number output obtained through command prompts. This nuance underscores the importance of employing precise and accurate validation methods, emphasizing the need for both meticulous documentation and an understanding of the unique hardware configurations.</p><figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="719" height="480" src="https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-motherboard.jpg" alt="Mac M1 motherboard" class="wp-image-11712" srcset="https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-motherboard.jpg 719w, https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-motherboard-300x200.jpg 300w, https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-motherboard-18x12.jpg 18w, https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-motherboard-600x401.jpg 600w" sizes="auto, (max-width: 719px) 100vw, 719px" /><figcaption class="wp-element-caption">Mac M1 motherboard</figcaption></figure><figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="400" height="400" src="https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-SSD.jpg" alt="Mac M1 SSD" class="wp-image-11713" srcset="https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-SSD.jpg 400w, https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-SSD-300x300.jpg 300w, https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-SSD-150x150.jpg 150w, https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-SSD-12x12.jpg 12w, https://cybersecthreat.com/wp-content/uploads/2023/12/Mac-M1-SSD-100x100.jpg 100w" sizes="auto, (max-width: 400px) 100vw, 400px" /><figcaption class="wp-element-caption">Mac M1 SSD</figcaption></figure><figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="473" height="1024" src="https://cybersecthreat.com/wp-content/uploads/2023/12/Hard-Disk-Serial-Numbers-on-Mac-473x1024.png" alt="Hard Disk Serial Numbers on Mac M1" class="wp-image-11714" srcset="https://cybersecthreat.com/wp-content/uploads/2023/12/Hard-Disk-Serial-Numbers-on-Mac-473x1024.png 473w, https://cybersecthreat.com/wp-content/uploads/2023/12/Hard-Disk-Serial-Numbers-on-Mac-139x300.png 139w, https://cybersecthreat.com/wp-content/uploads/2023/12/Hard-Disk-Serial-Numbers-on-Mac-768x1662.png 768w, https://cybersecthreat.com/wp-content/uploads/2023/12/Hard-Disk-Serial-Numbers-on-Mac-710x1536.png 710w, https://cybersecthreat.com/wp-content/uploads/2023/12/Hard-Disk-Serial-Numbers-on-Mac-946x2048.png 946w, https://cybersecthreat.com/wp-content/uploads/2023/12/Hard-Disk-Serial-Numbers-on-Mac-6x12.png 6w, https://cybersecthreat.com/wp-content/uploads/2023/12/Hard-Disk-Serial-Numbers-on-Mac-600x1298.png 600w, https://cybersecthreat.com/wp-content/uploads/2023/12/Hard-Disk-Serial-Numbers-on-Mac.png 1170w" sizes="auto, (max-width: 473px) 100vw, 473px" /><figcaption class="wp-element-caption">Hard Disk Serial Numbers on Mac M1</figcaption></figure><h2 class="wp-block-heading" id="h-conclusion">Conclusion:</h2><p>In this comprehensive guide, we explored multiple methods to retrieve hard disk serial numbers on a Mac, covering both GUI and Terminal approaches. Whether dealing with SATA or NVMe drives, these commands offer valuable insights into your storage devices. Keep in mind that the output may vary based on your macOS version and hardware configuration.</p><p>Understanding how to obtain this information is crucial for system maintenance, troubleshooting, and verifying the authenticity of your hardware. Incorporate these commands into your toolbox for effective Mac system administration.</p><h3 class="wp-block-heading">The role of Retrieving and Validating Hard Disk Serial Numbers in Data Destruction and ITAD Projects</h3><p>In the dynamic landscape of Data Destruction and IT Asset Disposition (ITAD) projects, the need to validate hard disk serial numbers takes on new significance. This guide equips you with diverse methods, highlighting the nuances of MacBook M1 series with embedded SSDs. These insights are crucial for ensuring secure and responsible data handling during ITAD initiatives.</p><p>The validation processes detailed in this guide become a cornerstone in the meticulous inventory management essential for ITAD projects. As you adapt the commands to align with your specific environment, remember that these validation steps contribute significantly to the integrity and security of data throughout its lifecycle.</p><p>In the realm of ITAD, where devices are prepared for reuse, resale, or disposal, this guide empowers you to navigate the intricacies of embedded SSDs, ensuring accurate documentation and adherence to the highest standards of data security and compliance.</p><p>As you embark on your Data Destruction and ITAD journey, embracing the knowledge shared in this guide positions you at the forefront of responsible data management. Happy validating, and may your ITAD endeavors be marked by precision and security!</p><p>Happy validating, and best of luck with your ITAD endeavors!</p><p><strong>Reference:</strong></p><p><a href="https://apple.stackexchange.com/questions/464004/possible-diskutil-info-protocol-fields">https://apple.stackexchange.com/questions/464004/possible-diskutil-info-protocol-fields</a></p><h2 class="wp-block-heading has-text-align-center" id="h-check-out-our-complete-it-asset-disposition-itad-offering">Check out our complete <a href="https://cybersecthreat.com/itad-service/">IT Asset Disposition (ITAD)</a> offering:</h2><p class="has-text-align-center"><a href="https://cybersecthreat.com/itad-service/">ITAD Service</a></p><p>The post <a href="https://cybersecthreat.com/2023/12/01/retrieving-and-validating-hard-disk-serial-numbers-on-mac/">Retrieving and Validating Hard Disk Serial Numbers on Mac</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  386. ]]></content:encoded>
  387. <wfw:commentRss>https://cybersecthreat.com/2023/12/01/retrieving-and-validating-hard-disk-serial-numbers-on-mac/feed/</wfw:commentRss>
  388. <slash:comments>0</slash:comments>
  389. </item>
  390. <item>
  391. <title>Amplifying Cybersecurity Defenses: Harnessing the Power of Recorded Future&#8217;s Threat Intelligence and Swimlane SOAR</title>
  392. <link>https://cybersecthreat.com/2023/07/31/recorded_future-swimlane-seminar-event-21-sep-2023/</link>
  393. <dc:creator><![CDATA[CyberSecThreat Editor Team]]></dc:creator>
  394. <pubDate>Mon, 31 Jul 2023 09:26:27 +0000</pubDate>
  395. <category><![CDATA[Blue Team]]></category>
  396. <category><![CDATA[CTI]]></category>
  397. <category><![CDATA[Cyber Threat Intelligence]]></category>
  398. <category><![CDATA[Events]]></category>
  399. <category><![CDATA[Hyperautomation]]></category>
  400. <category><![CDATA[News]]></category>
  401. <category><![CDATA[SOAR]]></category>
  402. <category><![CDATA[Threat Intelligence]]></category>
  403. <category><![CDATA[Zero Trust]]></category>
  404. <category><![CDATA[Incident Response]]></category>
  405. <guid isPermaLink="false">https://cybersecthreat.com/?p=11183</guid>
  406.  
  407. <description><![CDATA[<p>We are thrilled to collaborate in hosting this seminar, showcasing the synergy between &#8220;Recorded Future Threat Intelligence – Integrated Modern Cybersecurity Controls&#8221; and &#8220;Swimlane Low-Code Security Automation &#38; SOAR Platform&#8221; platforms. Witness how the combination of 2 platforms revolutionizes your cyber security defense. In this era of digital convergence, unleash the true potential of threat...</p>
  408. <p>The post <a href="https://cybersecthreat.com/2023/07/31/recorded_future-swimlane-seminar-event-21-sep-2023/">Amplifying Cybersecurity Defenses: Harnessing the Power of Recorded Future&#8217;s Threat Intelligence and Swimlane SOAR</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  409. ]]></description>
  410. <content:encoded><![CDATA[<p class="kt-adv-heading11183_ea2113-5c wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_ea2113-5c">We are thrilled to collaborate in hosting this seminar, showcasing the synergy between &#8220;Recorded Future Threat Intelligence – Integrated Modern Cybersecurity Controls&#8221; and &#8220;Swimlane Low-Code Security Automation &amp; SOAR Platform&#8221; platforms. Witness how the combination of 2 platforms revolutionizes your cyber security defense. In this era of digital convergence, unleash the true potential of threat intelligence-driven automation and coordination, ensuring proactive defense and rapid response in the cybersecurity domain.</p><h2 class="kt-adv-heading11183_c001e5-9a wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_c001e5-9a">Event Overview:</h2><p class="kt-adv-heading11183_cf536c-58 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_cf536c-58">Are you ready to embark on an exciting new journey in the world of cybersecurity? We cordially invite you to participate in our upcoming seminar, where you will have the firsthand opportunity to experience the power of &#8220;Cyber Fusion&#8221;. Discover how this concept unlocks the full potential by seamlessly merging diverse teams and cutting-edge technologies, breaking down the silos of different security tools. Gain the ability to detect, analyze, and respond to threats in real-time through automated processes. The foundation of Cyber Fusion originally came from military intelligence strategies, with its core focus on promoting collaborative efforts across various domains, leveraging traceable pattern recognition, and finally achieving a deeper understanding of the threat landscape. By harnessing the power of threat intelligence, we establish efficient and resilient strategies to counter threats.</p><p class="kt-adv-heading11183_2f2c3e-7e wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_2f2c3e-7e">Join us in embracing the perfect fusion of two cutting-edge cybersecurity technologies: CTI (Cyber Threat Intelligence) and SOAR (Security Orchestration, Automation, and Response). Envision summoning the &#8220;Sherlock Holmes with Time Stones&#8221; – possessing the capability to proactively deduce clues and predict outcomes. Empower your security team to regain control without compromise for today and the future.</p><h2 class="kt-adv-heading11183_0b53d6-e4 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_0b53d6-e4"><strong>Key Topics to be Covered:</strong></h2><div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items11183_862a05-67 kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_1531b8-c3"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong><strong><strong>Machine-speed defense in the AI era:</strong></strong> </strong>Combating automated targeted attacks through CTI integration and Hyperautomation</span></li>
  411.  
  412. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_e225f1-4a"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>The Synergy of Cyber Threat Intelligence and SOAR:</strong> How integration creates a force multiplier for your cybersecurity defenses.</span></li>
  413.  
  414. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_89c35b-35"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Real-world Success Stories:</strong> Learn from organizations that have harnessed this integration to defend against sophisticated cyber threats.</span></li>
  415.  
  416. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_5abca4-98"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Achieving Proactive Threat Hunting:</strong> Leveraging threat intelligence to proactively hunt for and neutralize emerging threats.</span></li>
  417.  
  418. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_caf4ff-be"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Streamlining Incident Response aligns with NIST Standards:</strong> Witness how Hyperautomation and orchestration speed up incident resolution.</span></li>
  419.  
  420. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_3a49a5-d6"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Integrating Zero Trust:</strong> Complete the Final Puzzle Piece of the Comprehensive Zero Trust Framework.</span></li>
  421.  
  422. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_53cd61-c0"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Future-Proofing Your Cybersecurity:</strong> Adapting to the evolving threat landscape with intelligence-driven automatic defenses.</span></li>
  423.  
  424. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_00cf34-8a"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Q&amp;A Session:</strong> Engage with cybersecurity experts to gain insights into your organization&#8217;s unique security challenges.</span></li></ul></div><p class="kt-adv-heading11183_5a1881-e1 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_5a1881-e1">Don&#8217;t miss this exclusive opportunity to discover the combined power of Recorded Future&#8217;s Cyber Threat Intelligence and Swimlane SOAR. Elevate your organization&#8217;s cybersecurity defense to a new level of sophistication with Recorded Future, Swimlane and CyberSecThreat.</p><p class="kt-adv-heading11183_d78b18-52 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_d78b18-52">Stay tuned for more updates and announcements regarding the event. For any inquiries, please contact us at <a href="mailto:event@cybersecthreat.com">event@cybersecthreat.com</a>. We look forward to welcoming you to this exclusive seminar event and working together to build a more secure digital future.</p><div class="kb-row-layout-wrap kb-row-layout-id11183_ac3090-9a alignnone kt-row-has-bg wp-block-kadence-rowlayout"><div class="kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top">
  425. <div class="wp-block-kadence-column kadence-column11183_adcb97-0c"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading11183_fc300f-a1 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_fc300f-a1">Event Information</h2>
  426.  
  427. <div class="wp-block-kadence-spacer aligncenter kt-block-spacer-11183_bcea8c-5f"><div class="kt-block-spacer kt-block-spacer-halign-center"><hr class="kt-divider"/></div></div>
  428.  
  429. <div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items11183_a833ff-29 kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_957db1-aa"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Who Should Attend:</strong></span></li>
  430.  
  431. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_adad3d-8f kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M22 11.08V12a10 10 0 1 1-5.93-9.14"/><polyline points="22 4 12 14.01 9 11.01"/></svg></span><span class="kt-svg-icon-list-text">CIO, CISO, Chief Risk Officer, Chief Auditor</span></li>
  432.  
  433. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_f11003-f5 kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M22 11.08V12a10 10 0 1 1-5.93-9.14"/><polyline points="22 4 12 14.01 9 11.01"/></svg></span><span class="kt-svg-icon-list-text">IT Managers and Decision Makers</span></li>
  434.  
  435. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_ba3a7e-d0 kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M22 11.08V12a10 10 0 1 1-5.93-9.14"/><polyline points="22 4 12 14.01 9 11.01"/></svg></span><span class="kt-svg-icon-list-text">Cyber Security Professionals</span></li>
  436.  
  437. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_33c9f7-d5 kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M22 11.08V12a10 10 0 1 1-5.93-9.14"/><polyline points="22 4 12 14.01 9 11.01"/></svg></span><span class="kt-svg-icon-list-text">Threat Intelligence Analysts</span></li>
  438.  
  439. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_af68be-cf kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M22 11.08V12a10 10 0 1 1-5.93-9.14"/><polyline points="22 4 12 14.01 9 11.01"/></svg></span><span class="kt-svg-icon-list-text">Security Operations Center (SOC) Teams</span></li>
  440.  
  441. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_c2b456-bb kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_checkCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><path d="M22 11.08V12a10 10 0 1 1-5.93-9.14"/><polyline points="22 4 12 14.01 9 11.01"/></svg></span><span class="kt-svg-icon-list-text">Incident Response Teams</span></li>
  442.  
  443. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_9489f5-2e"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Date:</strong> Thu, 21 Sep 2023 09:30 &#8211; 14:00</span></li>
  444.  
  445. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_70a9d7-98"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Venue:</strong> <a href="https://goo.gl/maps/fy6h2s3a873eLFLw9">Oriental 1, Mandarin Oriental Hotels</a></span></li>
  446.  
  447. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11183_1d6108-48"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Note:</strong> Limited seats are available!</span></li></ul></div></div></div>
  448.  
  449. <div class="wp-block-kadence-column kadence-column11183_739ede-fa kb-section-dir-vertical"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading11183_237cb1-36 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_237cb1-36">Agenda</h2>
  450.  
  451. <div class="wp-block-kadence-spacer aligncenter kt-block-spacer-11183_f397ba-3d"><div class="kt-block-spacer kt-block-spacer-halign-center"><hr class="kt-divider"/></div></div>
  452.  
  453. <figure class="wp-block-table is-style-stripes"><table><tbody><tr><td class="has-text-align-left" data-align="left"><strong>09:30</strong></td><td class="has-text-align-left" data-align="left">Registration opens</td></tr><tr><td class="has-text-align-left" data-align="left"><strong>10:00</strong></td><td class="has-text-align-left" data-align="left">Welcome Address by <em>Kelvin Yip, CISO at CyberSecThreat</em></td></tr><tr><td class="has-text-align-left" data-align="left"><strong>10:10</strong></td><td class="has-text-align-left" data-align="left">Presentation by <em><a href="https://www.linkedin.com/in/chienjen-yeo/">Chien Jen (CJ) Yeo</a>, Sales Engineering Director at Recorded Future</em></td></tr><tr><td class="has-text-align-left" data-align="left"><strong>10:30</strong></td><td class="has-text-align-left" data-align="left">Presentation by <em><a href="https://www.linkedin.com/in/c-h-ang-8162a9174/">C H Ang</a>, <em>Regional Director at Swimlane</em></em> <em>&amp; <a href="https://www.linkedin.com/in/khaichen-wong/">KhaiChen (KC) Wong</a>, <em>Solution Engineering at Swimlane</em></em></td></tr><tr><td class="has-text-align-left" data-align="left"><strong>10:50</strong></td><td class="has-text-align-left" data-align="left">Tea Break and Networking</td></tr><tr><td class="has-text-align-left" data-align="left"><strong>11:10</strong></td><td class="has-text-align-left" data-align="left">Joint Demo by Recorded Future &amp; Swimlane</td></tr><tr><td class="has-text-align-left" data-align="left"><strong>11:45</strong></td><td class="has-text-align-left" data-align="left">Short Quiz + Q&amp;A</td></tr><tr><td class="has-text-align-left" data-align="left"><strong>12:00</strong></td><td class="has-text-align-left" data-align="left">Luncheon &amp; Discussion</td></tr><tr><td class="has-text-align-left" data-align="left"><strong>14:00 </strong></td><td class="has-text-align-left" data-align="left">Luncheon ends</td></tr></tbody></table></figure></div></div>
  454. </div></div><div class="kb-row-layout-wrap kb-row-layout-id11183_88b412-5c alignnone wp-block-kadence-rowlayout"><div class="kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top">
  455. <div class="wp-block-kadence-column kadence-column11183_5a2533-38"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading11183_f61c33-fc wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11183_f61c33-fc">Registration Form</h2>
  456.  
  457. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  458.  
  459. <div class="wpforms-container wpforms-container-full wpforms-block wpforms-block-64495015-a421-41c7-932d-9575054f4173 wpforms-render-modern" id="wpforms-11179"><form id="wpforms-form-11179" class="wpforms-validate wpforms-form wpforms-ajax-form" data-formid="11179" method="post" enctype="multipart/form-data" action="/feed/" data-token="0e79c369e34bd081a0eb17f123029022" data-token-time="1733107992"><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-hidden" id="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</div><div class="wpforms-field-container"><div id="wpforms-11179-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><fieldset><legend class="wpforms-field-label">Name &amp; Surname <span class="wpforms-required-label" aria-hidden="true">*</span></legend><div class="wpforms-field-row wpforms-field-large"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-11179-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" placeholder="First Name" aria-errormessage="wpforms-11179-field_0-error" required><label for="wpforms-11179-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-11179-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" placeholder="Last Name" aria-errormessage="wpforms-11179-field_0-last-error" required><label for="wpforms-11179-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></fieldset></div><div id="wpforms-11179-field_14-container" class="wpforms-field wpforms-field-text" data-field-id="14"><label class="wpforms-field-label" for="wpforms-11179-field_14">Name of Organization <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-11179-field_14" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][14]" aria-errormessage="wpforms-11179-field_14-error" required></div><div id="wpforms-11179-field_15-container" class="wpforms-field wpforms-field-text" data-field-id="15"><label class="wpforms-field-label" for="wpforms-11179-field_15">Department <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-11179-field_15" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][15]" aria-errormessage="wpforms-11179-field_15-error" required></div><div id="wpforms-11179-field_16-container" class="wpforms-field wpforms-field-text" data-field-id="16"><label class="wpforms-field-label" for="wpforms-11179-field_16">Job Position <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-11179-field_16" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][16]" aria-errormessage="wpforms-11179-field_16-error" required></div><div id="wpforms-11179-field_20-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="20"><label class="wpforms-field-label" for="wpforms-11179-field_20">Does your organization have a SOC / SIEM? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-11179-field_20" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][20]" required="required"><option value="" class="placeholder" disabled >Does your organization have a SOC / SIEM?</option><option value="Yes (Internal)" >Yes (Internal)</option><option value="Yes (Outsourced)" >Yes (Outsourced)</option><option value="No"  selected='selected'>No</option></select></div><div id="wpforms-11179-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-11179-field_1">Business E-mail <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="email" id="wpforms-11179-field_1" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][1]" placeholder="Only accept Business E-mail" spellcheck="false" aria-errormessage="wpforms-11179-field_1-error" required></div><div id="wpforms-11179-field_4-container" class="wpforms-field wpforms-field-phone" data-field-id="4"><label class="wpforms-field-label" for="wpforms-11179-field_4">Mobile Number</label><input type="tel" id="wpforms-11179-field_4" class="wpforms-field-large wpforms-smart-phone-field" data-rule-smart-phone-field="true" name="wpforms[fields][4]" placeholder="0933-1230456" aria-label="Mobile Number" aria-errormessage="wpforms-11179-field_4-error" ></div><div id="wpforms-11179-field_27-container" class="wpforms-field wpforms-field-text" data-field-id="27"><label class="wpforms-field-label" for="wpforms-11179-field_27">Phone <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-11179-field_27" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][27]" placeholder="02-22223333#456" aria-errormessage="wpforms-11179-field_27-error" required></div><div id="wpforms-11179-field_19-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="19"><label class="wpforms-field-label" for="wpforms-11179-field_19">Is proof of attendance required? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-11179-field_19" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][19]" required="required"><option value="" class="placeholder" disabled >Is proof of attendance required?</option><option value="Yes" >Yes</option><option value="No"  selected='selected'>No</option></select><div id="wpforms-11179-field_19-description" class="wpforms-field-description">Will be Delivered via Email within 10 working days after attendance</div></div><div id="wpforms-11179-field_28-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="28"><label class="wpforms-field-label" for="wpforms-11179-field_28">Join Luncheon? (12:00 &#8211; 14:00) <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-11179-field_28" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][28]" required="required"><option value="" class="placeholder" disabled  selected='selected'>Join Luncheon? (12:00 &#8211; 14:00)</option><option value="Yes" >Yes</option><option value="No" >No</option></select></div><div id="wpforms-11179-field_18-container" class="wpforms-field wpforms-field-text" data-field-id="18"><label class="wpforms-field-label" for="wpforms-11179-field_18">Dietary restrictions</label><input type="text" id="wpforms-11179-field_18" class="wpforms-field-large" name="wpforms[fields][18]" placeholder="Vegetarian or other restrictions" aria-errormessage="wpforms-11179-field_18-error" ></div><div id="wpforms-11179-field_23-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="23"><label class="wpforms-field-label" for="wpforms-11179-field_23">Is parking required? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-11179-field_23" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][23]" required="required"><option value="" class="placeholder" disabled  selected='selected'>Is parking required?</option><option value="Yes" >Yes</option><option value="No" >No</option></select></div><div id="wpforms-11179-field_29-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="29"><label class="wpforms-field-label" for="wpforms-11179-field_29">How did you know about this event? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-11179-field_29" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][29]" required="required"><option value="" class="placeholder" disabled  selected='selected'>How did you know about this event?</option><option value="Facebook" >Facebook</option><option value="LinkedIn" >LinkedIn</option><option value="Twitter" >Twitter</option><option value="Line" >Line</option><option value="Reseller" >Reseller</option><option value="E-mail Newsletter" >E-mail Newsletter</option><option value="Sales Representative of CyberSecThreat" >Sales Representative of CyberSecThreat</option><option value="Others" >Others</option></select></div><div id="wpforms-11179-field_25-container" class="wpforms-field wpforms-field-text" data-field-id="25"><label class="wpforms-field-label" for="wpforms-11179-field_25">Business Contact Person</label><input type="text" id="wpforms-11179-field_25" class="wpforms-field-large" name="wpforms[fields][25]" placeholder="Name of Business + Name" aria-errormessage="wpforms-11179-field_25-error" ></div><div id="wpforms-11179-field_26-container" class="wpforms-field wpforms-field-gdpr-checkbox" data-field-id="26"><label class="wpforms-field-label">GDPR Agreement <span class="wpforms-required-label" aria-hidden="true">*</span></label><ul id="wpforms-11179-field_26" class="wpforms-field-required"><li class="choice-1"><input type="checkbox" id="wpforms-11179-field_26_1" name="wpforms[fields][26][]" value="I consent to having this website store my submitted information so they can respond to my inquiry." aria-errormessage="wpforms-11179-field_26_1-error" required ><label class="wpforms-field-label-inline" for="wpforms-11179-field_26_1">I consent to having this website store my submitted information so they can respond to my inquiry.</label></li></ul></div></div><!-- .wpforms-field-container --><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="11179"><input type="hidden" name="page_title" value=""><input type="hidden" name="page_url" value="https://cybersecthreat.com/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-11179" class="wpforms-submit" data-alt-text="Sending registration information..." data-submit-text="Submit registration information" aria-live="assertive" value="wpforms-submit">Submit registration information</button><img loading="lazy" decoding="async" src="https://cybersecthreat.com/wp-content/plugins/wpforms/assets/images/submit-spin.svg" class="wpforms-submit-spinner" style="display: none;" width="26" height="26" alt="Loading"></div></form></div>  <!-- .wpforms-container --></div></div>
  460. </div></div><p>Event highlights:</p><p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7115180520707145729">https://www.linkedin.com/feed/update/urn:li:activity:7115180520707145729</a></p><p>The post <a href="https://cybersecthreat.com/2023/07/31/recorded_future-swimlane-seminar-event-21-sep-2023/">Amplifying Cybersecurity Defenses: Harnessing the Power of Recorded Future&#8217;s Threat Intelligence and Swimlane SOAR</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  461. ]]></content:encoded>
  462. </item>
  463. <item>
  464. <title>Swimlane CXO Round Table Event &#8211; 12 Jul 2023</title>
  465. <link>https://cybersecthreat.com/2023/06/01/swimlane-cxo-round-table-event-12-jul-2023/</link>
  466. <dc:creator><![CDATA[CyberSecThreat Editor Team]]></dc:creator>
  467. <pubDate>Thu, 01 Jun 2023 05:09:30 +0000</pubDate>
  468. <category><![CDATA[Blue Team]]></category>
  469. <category><![CDATA[CTI]]></category>
  470. <category><![CDATA[Cyber Threat Intelligence]]></category>
  471. <category><![CDATA[Events]]></category>
  472. <category><![CDATA[Hyperautomation]]></category>
  473. <category><![CDATA[News]]></category>
  474. <category><![CDATA[SOAR]]></category>
  475. <category><![CDATA[Threat Intelligence]]></category>
  476. <category><![CDATA[Zero Trust]]></category>
  477. <category><![CDATA[Incident Response]]></category>
  478. <guid isPermaLink="false">https://cybersecthreat.com/?p=11024</guid>
  479.  
  480. <description><![CDATA[<p>We are excited to announce a groundbreaking event that brings together the brightest minds in the cybersecurity industry. CyberSecThreat, a leading Cyber Security Company in Taiwan, in collaboration with Swimlane, a renowned Low-Code Security Automation &#38; SOAR Platform, invites you to our exclusive round table event on Jul 12th, 2023. Themed around &#8220;Hyperautomation feat Zero...</p>
  481. <p>The post <a href="https://cybersecthreat.com/2023/06/01/swimlane-cxo-round-table-event-12-jul-2023/">Swimlane CXO Round Table Event &#8211; 12 Jul 2023</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  482. ]]></description>
  483. <content:encoded><![CDATA[<p class="kt-adv-heading11024_e6ced2-38 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_e6ced2-38">We are excited to announce a groundbreaking event that brings together the brightest minds in the cybersecurity industry. CyberSecThreat, a leading Cyber Security Company in Taiwan, in collaboration with Swimlane, a renowned Low-Code Security Automation &amp; SOAR Platform, invites you to our exclusive round table event on Jul 12th, 2023.</p><p class="kt-adv-heading11024_c02fc7-53 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_c02fc7-53">Themed around &#8220;Hyperautomation feat Zero Trust 2.0&#8221;, this event aims to explore the convergence of two powerful concepts that are revolutionizing the cybersecurity landscape. We will dive deep into the potential of Hyperautomation, which integrates advanced technologies like AI, machine learning, and process automation, with Zero Trust 2.0, an innovative security approach that assumes zero trust for every user and device.</p><p class="kt-adv-heading11024_a351ab-d9 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_a351ab-d9">Here&#8217;s what you can expect from this enlightening event:</p><div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items11024_d53155-6d kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11024_794d20-aa"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Engaging Panel Discussions:</strong> Our panel of cybersecurity experts and thought leaders will delve into the intricacies of Hyperautomation and Zero Trust 2.0. Gain insights into how these concepts can reshape your security strategies and enable your organization to stay one step ahead of evolving threats.</span></li>
  484.  
  485. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11024_d10f4a-1a"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Live Demonstrations:</strong> Experience the power of Swimlane&#8217;s Low-Code Security Automation &amp; SOAR Platform through live demonstrations. Witness how automation and zero trust principles can optimize your threat detection, incident response, and security operations.</span></li>
  486.  
  487. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11024_69075d-ff"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Networking Opportunities:</strong> Connect with like-minded professionals, industry peers, and representatives from CyberSecThreat and Swimlane. Expand your professional network, exchange ideas, and forge collaborations that will drive innovation and strengthen the cybersecurity community.</span></li></ul></div><p class="kt-adv-heading11024_d4253d-f9 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_d4253d-f9">Registration is now open, and seats are limited. Secure your spot today by the registration form below. Don&#8217;t miss this unique opportunity to be part of an event that can shape the future of your organization&#8217;s cybersecurity posture. Even though this is an exclusive event, attendance is by invitation only. Any interested parties please do not hesitate to contact us or directly registered using our online form.</p><p class="kt-adv-heading11024_a1d761-6a wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_a1d761-6a">At CyberSecThreat, we are committed to empowering businesses with the latest advancements in cybersecurity. Together with Swimlane, we aim to lead the industry by embracing the power of Hyperautomation feat Zero Trust 2.0.</p><p class="kt-adv-heading11024_26909b-e4 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_26909b-e4">Stay tuned for more updates and announcements regarding the event. For any inquiries, please contact us at <a href="mailto:event@cybersecthreat.com">event@cybersecthreat.com</a>. We look forward to welcoming you to this exclusive round table event and working together to build a more secure digital future.</p><p class="kt-adv-heading11024_8e39c2-06 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_8e39c2-06"></p><div class="kb-row-layout-wrap kb-row-layout-id11024_b370ce-cc alignnone kt-row-has-bg wp-block-kadence-rowlayout"><div class="kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top">
  488. <div class="wp-block-kadence-column kadence-column11024_b2d3a8-5f"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading11024_c00add-50 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_c00add-50">Event Information</h2>
  489.  
  490. <div class="wp-block-kadence-spacer aligncenter kt-block-spacer-11024_cfc58b-12"><div class="kt-block-spacer kt-block-spacer-halign-center"><hr class="kt-divider"/></div></div>
  491.  
  492. <div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items11024_03f375-c4 kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11024_43ae51-8c kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Suitable for:</strong> CIO, CISO, Chief Risk Officer, Chief Auditor &amp; Information Security Management</span></li>
  493.  
  494. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11024_941855-59 kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Date:</strong> Wed, 12 Jul 2023 10:30 &#8211; 14:00</span></li>
  495.  
  496. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11024_1d7ce3-b5 kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Venue:</strong> <a href="https://goo.gl/maps/to9g8cPu6mfz8Lrr7">Peacock Room, Grand Hyatt Taipei</a></span></li>
  497.  
  498. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-11024_4c7669-18 kt-svg-icon-list-level-1"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Note:</strong> Limited seats are available!</span></li></ul></div></div></div>
  499.  
  500. <div class="wp-block-kadence-column kadence-column11024_4b9718-c2"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading11024_9f6ab6-0e wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_9f6ab6-0e">Agenda</h2>
  501.  
  502. <div class="wp-block-kadence-spacer aligncenter kt-block-spacer-11024_bfea29-70"><div class="kt-block-spacer kt-block-spacer-halign-center"><hr class="kt-divider"/></div></div>
  503.  
  504. <figure class="wp-block-table is-style-stripes"><table style="border-width:1px"><tbody><tr><td class="has-text-align-left" data-align="left"><strong>10:30</strong></td><td class="has-text-align-left" data-align="left">Registration opens</td></tr><tr><td class="has-text-align-left" data-align="left"><strong>11:00</strong></td><td class="has-text-align-left" data-align="left">Welcome Address by <em>Kelvin Yip, CISO at CyberSecThreat</em></td></tr><tr><td class="has-text-align-left" data-align="left"><strong>11:05</strong></td><td class="has-text-align-left" data-align="left">Presentation by <em>CH Ang, Regional Director at Swimlane</em></td></tr><tr><td class="has-text-align-left" data-align="left"><strong>11:10</strong></td><td class="has-text-align-left" data-align="left">Use-Case Presentation by <em>KC Wong, Solution Consultant at Swimlane</em></td></tr><tr><td class="has-text-align-left" data-align="left"><strong>12:00</strong></td><td class="has-text-align-left" data-align="left">Tea Break and Networking</td></tr><tr><td class="has-text-align-left" data-align="left"><strong>12:10</strong></td><td class="has-text-align-left" data-align="left">Swimlane SOAR Demonstration</td></tr><tr><td class="has-text-align-left" data-align="left"><strong>13:00</strong></td><td class="has-text-align-left" data-align="left">Luncheon &amp; Discussion by <em>CH Ang, Regional Director at Swimlane</em></td></tr><tr><td class="has-text-align-left" data-align="left"><strong>14:00</strong></td><td class="has-text-align-left" data-align="left">Luncheon ends</td></tr></tbody></table></figure></div></div>
  505. </div></div><div class="kb-row-layout-wrap kb-row-layout-id11024_3af266-d3 alignnone wp-block-kadence-rowlayout"><div class="kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top">
  506. <div class="wp-block-kadence-column kadence-column11024_b3d212-60"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading11024_7e9cf2-86 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_7e9cf2-86">Registration Form</h2>
  507.  
  508. <hr class="wp-block-separator has-alpha-channel-opacity"/>
  509.  
  510. <div class="wpforms-container wpforms-container-full wpforms-block wpforms-block-64495015-a421-41c7-932d-9575054f4173 wpforms-render-modern" id="wpforms-11029"><form id="wpforms-form-11029" class="wpforms-validate wpforms-form wpforms-ajax-form" data-formid="11029" method="post" enctype="multipart/form-data" action="/feed/" data-token="db2193e11cd0efe11c94fe0a817989c7" data-token-time="1733107992"><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-hidden" id="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</div><div class="wpforms-field-container"><div id="wpforms-11029-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><fieldset><legend class="wpforms-field-label">Name &amp; Surname <span class="wpforms-required-label" aria-hidden="true">*</span></legend><div class="wpforms-field-row wpforms-field-large"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-11029-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" placeholder="First Name" aria-errormessage="wpforms-11029-field_0-error" required><label for="wpforms-11029-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-11029-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" placeholder="Last Name" aria-errormessage="wpforms-11029-field_0-last-error" required><label for="wpforms-11029-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></fieldset></div><div id="wpforms-11029-field_14-container" class="wpforms-field wpforms-field-text" data-field-id="14"><label class="wpforms-field-label" for="wpforms-11029-field_14">Name of Organization <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-11029-field_14" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][14]" aria-errormessage="wpforms-11029-field_14-error" required></div><div id="wpforms-11029-field_15-container" class="wpforms-field wpforms-field-text" data-field-id="15"><label class="wpforms-field-label" for="wpforms-11029-field_15">Department <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-11029-field_15" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][15]" aria-errormessage="wpforms-11029-field_15-error" required></div><div id="wpforms-11029-field_16-container" class="wpforms-field wpforms-field-text" data-field-id="16"><label class="wpforms-field-label" for="wpforms-11029-field_16">Job Position <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-11029-field_16" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][16]" aria-errormessage="wpforms-11029-field_16-error" required></div><div id="wpforms-11029-field_20-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="20"><label class="wpforms-field-label" for="wpforms-11029-field_20">Does your organization have a SOC / SIEM? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-11029-field_20" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][20]" required="required"><option value="" class="placeholder" disabled >Does your organization have a SOC / SIEM?</option><option value="Yes (Internal)" >Yes (Internal)</option><option value="Yes (Outsourced)" >Yes (Outsourced)</option><option value="No"  selected='selected'>No</option></select></div><div id="wpforms-11029-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-11029-field_1">Business E-mail <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="email" id="wpforms-11029-field_1" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][1]" placeholder="Only accept Business E-mail" spellcheck="false" aria-errormessage="wpforms-11029-field_1-error" required></div><div id="wpforms-11029-field_4-container" class="wpforms-field wpforms-field-phone" data-field-id="4"><label class="wpforms-field-label" for="wpforms-11029-field_4">Mobile Number</label><input type="tel" id="wpforms-11029-field_4" class="wpforms-field-large wpforms-smart-phone-field" data-rule-smart-phone-field="true" name="wpforms[fields][4]" placeholder="0933-1230456" aria-label="Mobile Number" aria-errormessage="wpforms-11029-field_4-error" ></div><div id="wpforms-11029-field_27-container" class="wpforms-field wpforms-field-text" data-field-id="27"><label class="wpforms-field-label" for="wpforms-11029-field_27">Phone <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-11029-field_27" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][27]" placeholder="02-22223333#456" aria-errormessage="wpforms-11029-field_27-error" required></div><div id="wpforms-11029-field_19-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="19"><label class="wpforms-field-label" for="wpforms-11029-field_19">Is proof of attendance required? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-11029-field_19" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][19]" required="required"><option value="" class="placeholder" disabled >Is proof of attendance required?</option><option value="Yes" >Yes</option><option value="No"  selected='selected'>No</option></select><div id="wpforms-11029-field_19-description" class="wpforms-field-description">Will be Delivered via Email within 10 working days after attendance</div></div><div id="wpforms-11029-field_18-container" class="wpforms-field wpforms-field-text" data-field-id="18"><label class="wpforms-field-label" for="wpforms-11029-field_18">Dietary restrictions</label><input type="text" id="wpforms-11029-field_18" class="wpforms-field-large" name="wpforms[fields][18]" placeholder="Vegetarian or other restrictions" aria-errormessage="wpforms-11029-field_18-error" ></div><div id="wpforms-11029-field_23-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="23"><label class="wpforms-field-label" for="wpforms-11029-field_23">Is parking required? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-11029-field_23" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][23]" required="required"><option value="" class="placeholder" disabled  selected='selected'>Is parking required?</option><option value="Yes" >Yes</option><option value="No" >No</option></select></div><div id="wpforms-11029-field_25-container" class="wpforms-field wpforms-field-text" data-field-id="25"><label class="wpforms-field-label" for="wpforms-11029-field_25">Business Contact Person</label><input type="text" id="wpforms-11029-field_25" class="wpforms-field-large" name="wpforms[fields][25]" placeholder="Please input Name of Business Contact Person" aria-errormessage="wpforms-11029-field_25-error" ></div><div id="wpforms-11029-field_26-container" class="wpforms-field wpforms-field-gdpr-checkbox" data-field-id="26"><label class="wpforms-field-label">GDPR Agreement <span class="wpforms-required-label" aria-hidden="true">*</span></label><ul id="wpforms-11029-field_26" class="wpforms-field-required"><li class="choice-1"><input type="checkbox" id="wpforms-11029-field_26_1" name="wpforms[fields][26][]" value="I consent to having this website store my submitted information so they can respond to my inquiry." aria-errormessage="wpforms-11029-field_26_1-error" required ><label class="wpforms-field-label-inline" for="wpforms-11029-field_26_1">I consent to having this website store my submitted information so they can respond to my inquiry.</label></li></ul></div></div><!-- .wpforms-field-container --><div class="wpforms-recaptcha-container wpforms-is-recaptcha wpforms-is-recaptcha-type-v3" ><input type="hidden" name="wpforms[recaptcha]" value=""></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="11029"><input type="hidden" name="page_title" value=""><input type="hidden" name="page_url" value="https://cybersecthreat.com/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-11029" class="wpforms-submit" data-alt-text="Sending registration information..." data-submit-text="Submit registration information" aria-live="assertive" value="wpforms-submit">Submit registration information</button><img loading="lazy" decoding="async" src="https://cybersecthreat.com/wp-content/plugins/wpforms/assets/images/submit-spin.svg" class="wpforms-submit-spinner" style="display: none;" width="26" height="26" alt="Loading"></div></form></div>  <!-- .wpforms-container --></div></div>
  511. </div></div><p class="kt-adv-heading11024_dc36a4-f9 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_dc36a4-f9">Event highlights:</p><p class="kt-adv-heading11024_200719-44 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading11024_200719-44"><a href="https://www.linkedin.com/posts/cybersecthreat-corporation-limited_mpehrphtc-opkhdnhyr-hawhytlwu-activity-7086645565286989824-qkCl/?utm_source=share&amp;utm_medium=member_ios">https://www.linkedin.com/posts/cybersecthreat-corporation-limited_mpehrphtc-opkhdnhyr-hawhytlwu-activity-7086645565286989824-qkCl/?utm_source=share&amp;utm_medium=member_ios</a></p><p>The post <a href="https://cybersecthreat.com/2023/06/01/swimlane-cxo-round-table-event-12-jul-2023/">Swimlane CXO Round Table Event &#8211; 12 Jul 2023</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  512. ]]></content:encoded>
  513. </item>
  514. <item>
  515. <title>CXO Round Table Event on CTI, 09 May 2023</title>
  516. <link>https://cybersecthreat.com/2023/04/05/cxo-round-table-event-on-cti-09-may-2023/</link>
  517. <dc:creator><![CDATA[CyberSecThreat Editor Team]]></dc:creator>
  518. <pubDate>Wed, 05 Apr 2023 14:28:16 +0000</pubDate>
  519. <category><![CDATA[CTI]]></category>
  520. <category><![CDATA[Cyber Threat Intelligence]]></category>
  521. <category><![CDATA[Events]]></category>
  522. <category><![CDATA[News]]></category>
  523. <category><![CDATA[Threat Intelligence]]></category>
  524. <guid isPermaLink="false">https://cybersecthreat.com/?p=10544</guid>
  525.  
  526. <description><![CDATA[<p>We are thrilled to announce an upcoming round table event on May 09th hosted by Recorded Future that will bring together top-level executives from various industries to discuss the importance of cyber threat intelligence (CTI) in today&#8217;s rapidly evolving cybersecurity landscape. During the luncheon, Jason Steer, Chief Information Security Officer at Recorded Future, will host...</p>
  527. <p>The post <a href="https://cybersecthreat.com/2023/04/05/cxo-round-table-event-on-cti-09-may-2023/">CXO Round Table Event on CTI, 09 May 2023</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  528. ]]></description>
  529. <content:encoded><![CDATA[<p class="kt-adv-heading10544_896466-2a wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_896466-2a">We are thrilled to announce an upcoming round table event on May 09th hosted by Recorded Future that will bring together top-level executives from various industries to discuss the importance of cyber threat intelligence (CTI) in today&#8217;s rapidly evolving cybersecurity landscape.</p><p class="kt-adv-heading10544_9940c1-03 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_9940c1-03">During the luncheon, <strong>Jason Steer, Chief Information Security Officer</strong> at Recorded Future, will host a discussion on recent significant cyber threat events and geopolitical trends that underline the growing convergence of cyber and geopolitical threats. </p><p class="kt-adv-heading10544_61f679-c5 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_61f679-c5">Join the discussion for insights on how these dynamics are impacting organizations in Taiwan and across the Asia Pacific region. We will explore how these threats pose a significant risk to the digital infrastructure of businesses and governments, and how organizations must disseminate security intelligence to respond to security events faster and prepare for future threats.</p><p class="kt-adv-heading10544_a35a4e-85 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_a35a4e-85">Attendees will leave the luncheon with greater insight on:</p><div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items10544_cdb2b7-a1 kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-10544_31e700-c9"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text">The latest intelligence portfolio insights</span></li>
  530.  
  531. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-10544_e3d276-42"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text">The applications of security intelligence across your organization</span></li>
  532.  
  533. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-10544_db88cd-9a"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text">Key insights into the current geopolitical and cyber threat landscape</span></li></ul></div><p class="kt-adv-heading10544_235138-1e wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_235138-1e">In addition to informative discussions, attendees will have the opportunity to network with other CXOs and leaders in the cybersecurity field and learn about the latest cybersecurity solutions and services offered by Recorded Future.</p><p class="kt-adv-heading10544_ae7075-07 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_ae7075-07">Even though this is an exclusive event, attendance is by invitation only. Any interested parties please do not hesitate to contact us or directly registered using our online form. We encourage you to RSVP as soon as possible to secure your spot at this unique CXO round table event.</p><p class="kt-adv-heading10544_9cbf66-f6 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_9cbf66-f6">We look forward to seeing you there!</p><div class="kb-row-layout-wrap kb-row-layout-id10544_cbcf8a-79 alignnone kt-row-has-bg wp-block-kadence-rowlayout"><div class="kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top">
  534. <div class="wp-block-kadence-column kadence-column10544_a80aed-1e"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading10544_e98a6c-69 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_e98a6c-69">Event Information</h2>
  535.  
  536. <div class="wp-block-kadence-spacer aligncenter kt-block-spacer-10544_d85db3-97"><div class="kt-block-spacer kt-block-spacer-halign-center"><hr class="kt-divider"/></div></div>
  537.  
  538. <div class="wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items10544_c73c37-c0 kt-svg-icon-list-columns-1 alignnone"><ul class="kt-svg-icon-list"><li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-10544_49dd23-d2"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Suitable for</strong>: CXO, CISO &amp; Information Security Management</span></li>
  539.  
  540. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-10544_596947-6c"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Date</strong>: Tue, 09 May 2023 11:30 &#8211; 14:00</span></li>
  541.  
  542. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-10544_a1aea2-f6"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Venue: </strong><a href="https://maps.app.goo.gl/LQYGx8vAmp948LyQ6?g_st=ic">Courtyard by Marriott Taipei</a> (9F Sea Venue)</span></li>
  543.  
  544. <li class="wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-10544_c53393-0d"><span class="kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single"><svg viewBox="0 0 24 24"  fill="none" stroke="currentColor" stroke-width="2.5" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"  aria-hidden="true"><circle cx="12" cy="12" r="10"/><polyline points="12 16 16 12 12 8"/><line x1="8" y1="12" x2="16" y2="12"/></svg></span><span class="kt-svg-icon-list-text"><strong>Note: </strong>Limited seats are available!</span></li></ul></div></div></div>
  545.  
  546. <div class="wp-block-kadence-column kadence-column10544_564c70-ce kb-section-dir-vertical"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading10544_fae728-5b wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_fae728-5b">Agenda</h2>
  547.  
  548. <div class="wp-block-kadence-spacer aligncenter kt-block-spacer-10544_b41122-cf"><div class="kt-block-spacer kt-block-spacer-halign-center"><hr class="kt-divider"/></div></div>
  549.  
  550. <figure class="wp-block-table is-style-stripes"><table style="border-style:none;border-width:0px"><tbody><tr><td class="has-text-align-center" data-align="center"><strong>11:30</strong></td><td class="has-text-align-left" data-align="left">Registration opens</td></tr><tr><td class="has-text-align-center" data-align="center"><strong>12:00</strong></td><td class="has-text-align-left" data-align="left">Welcome Address by <em>Kelvin Yip, CISO at CyberSecThreat</em></td></tr><tr><td class="has-text-align-center" data-align="center"><strong>12:05</strong></td><td class="has-text-align-left" data-align="left">Presentation by <em>Jason Steer, CISO at Recorded Future</em></td></tr><tr><td class="has-text-align-center" data-align="center"><strong>12:35</strong></td><td class="has-text-align-left" data-align="left">Luncheon &amp; Discussion by <em>Jason Steer, CISO at Recorded Future</em></td></tr><tr><td class="has-text-align-center" data-align="center"><strong>14:00</strong></td><td class="has-text-align-left" data-align="left">Luncheon ends</td></tr></tbody></table></figure></div></div>
  551. </div></div><figure class="wp-block-kadence-image kb-image10544_57ea06-63 size-full is-resized"><img loading="lazy" decoding="async" width="1000" height="667" src="https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded_Future_CISO_Jason-Steer_Headshot_min.jpg" alt="" class="kb-img wp-image-10549" srcset="https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded_Future_CISO_Jason-Steer_Headshot_min.jpg 1000w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded_Future_CISO_Jason-Steer_Headshot_min-300x200.jpg 300w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded_Future_CISO_Jason-Steer_Headshot_min-768x512.jpg 768w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded_Future_CISO_Jason-Steer_Headshot_min-18x12.jpg 18w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded_Future_CISO_Jason-Steer_Headshot_min-600x400.jpg 600w" sizes="auto, (max-width: 1000px) 100vw, 1000px" /></figure><h3 class="kt-adv-heading10544_ac01f5-db wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_ac01f5-db">About Jason Steer</h3><h3 class="kt-adv-heading10544_d9853b-8e wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_d9853b-8e">CISO, Recorded Future</h3><p class="kt-adv-heading10544_fc4893-f0 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_fc4893-f0">Jason Steer is CISO at Recorded Future. Jason has global responsibility for ensuring the protection, integrity, and confidentiality of all customer-facing services, internal operational systems, and related information assets. He has previously held positions at a number of successful security companies, including IronPort, Veracode, and FireEye. Jason’s expert commentary has been featured in BBC, CNN, and Al Jazeera, and he has worked with both the EU and UK Governments on cybersecurity strategy.</p><div class="kb-row-layout-wrap kb-row-layout-id10544_3c753a-03 alignnone wp-block-kadence-rowlayout"><div class="kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top">
  552. <div class="wp-block-kadence-column kadence-column10544_a82dcb-7a"><div class="kt-inside-inner-col"><h2 class="kt-adv-heading10544_5ad6aa-89 wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_5ad6aa-89">Registration Form</h2>
  553.  
  554. <div class="wp-block-kadence-spacer aligncenter kt-block-spacer-10544_b3b569-4c"><div class="kt-block-spacer kt-block-spacer-halign-center"><hr class="kt-divider"/></div></div>
  555.  
  556. <div class="wpforms-container wpforms-container-full wpforms-block wpforms-block-ac14afdf-6551-4cd0-9e24-f9be5f07526c wpforms-render-modern" id="wpforms-10764"><form id="wpforms-form-10764" class="wpforms-validate wpforms-form wpforms-ajax-form" data-formid="10764" method="post" enctype="multipart/form-data" action="/feed/" data-token="e02e7a33485fa668ddd2fb4b0339a473" data-token-time="1733107992"><noscript class="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</noscript><div class="wpforms-hidden" id="wpforms-error-noscript">Please enable JavaScript in your browser to complete this form.</div><div class="wpforms-field-container"><div id="wpforms-10764-field_0-container" class="wpforms-field wpforms-field-name" data-field-id="0"><fieldset><legend class="wpforms-field-label">Name &amp; Surname <span class="wpforms-required-label" aria-hidden="true">*</span></legend><div class="wpforms-field-row wpforms-field-large"><div class="wpforms-field-row-block wpforms-first wpforms-one-half"><input type="text" id="wpforms-10764-field_0" class="wpforms-field-name-first wpforms-field-required" name="wpforms[fields][0][first]" placeholder="First Name" aria-errormessage="wpforms-10764-field_0-error" required><label for="wpforms-10764-field_0" class="wpforms-field-sublabel after">First</label></div><div class="wpforms-field-row-block wpforms-one-half"><input type="text" id="wpforms-10764-field_0-last" class="wpforms-field-name-last wpforms-field-required" name="wpforms[fields][0][last]" placeholder="Last Name" aria-errormessage="wpforms-10764-field_0-last-error" required><label for="wpforms-10764-field_0-last" class="wpforms-field-sublabel after">Last</label></div></div></fieldset></div><div id="wpforms-10764-field_14-container" class="wpforms-field wpforms-field-text" data-field-id="14"><label class="wpforms-field-label" for="wpforms-10764-field_14">Name of Organization <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-10764-field_14" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][14]" aria-errormessage="wpforms-10764-field_14-error" required></div><div id="wpforms-10764-field_15-container" class="wpforms-field wpforms-field-text" data-field-id="15"><label class="wpforms-field-label" for="wpforms-10764-field_15">Department <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-10764-field_15" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][15]" aria-errormessage="wpforms-10764-field_15-error" required></div><div id="wpforms-10764-field_16-container" class="wpforms-field wpforms-field-text" data-field-id="16"><label class="wpforms-field-label" for="wpforms-10764-field_16">Job Position <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="text" id="wpforms-10764-field_16" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][16]" aria-errormessage="wpforms-10764-field_16-error" required></div><div id="wpforms-10764-field_20-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="20"><label class="wpforms-field-label" for="wpforms-10764-field_20">Does your organization have a SOC / SIEM? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-10764-field_20" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][20]" required="required"><option value="" class="placeholder" disabled >Does your organization have a SOC / SIEM?</option><option value="Yes (Internal)" >Yes (Internal)</option><option value="Yes (Outsourced)" >Yes (Outsourced)</option><option value="No"  selected='selected'>No</option></select></div><div id="wpforms-10764-field_1-container" class="wpforms-field wpforms-field-email" data-field-id="1"><label class="wpforms-field-label" for="wpforms-10764-field_1">Business E-mail <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="email" id="wpforms-10764-field_1" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][1]" spellcheck="false" aria-errormessage="wpforms-10764-field_1-error" required></div><div id="wpforms-10764-field_4-container" class="wpforms-field wpforms-field-phone" data-field-id="4"><label class="wpforms-field-label" for="wpforms-10764-field_4">Phone <span class="wpforms-required-label" aria-hidden="true">*</span></label><input type="tel" id="wpforms-10764-field_4" class="wpforms-field-large wpforms-field-required wpforms-smart-phone-field" data-rule-smart-phone-field="true" name="wpforms[fields][4]" aria-label="Phone" aria-errormessage="wpforms-10764-field_4-error" required></div><div id="wpforms-10764-field_19-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="19"><label class="wpforms-field-label" for="wpforms-10764-field_19">Is proof of attendance required? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-10764-field_19" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][19]" required="required"><option value="" class="placeholder" disabled >Is proof of attendance required?</option><option value="Yes" >Yes</option><option value="No"  selected='selected'>No</option></select><div id="wpforms-10764-field_19-description" class="wpforms-field-description">Will be Delivered via Email within 10 working days after attendance</div></div><div id="wpforms-10764-field_18-container" class="wpforms-field wpforms-field-text" data-field-id="18"><label class="wpforms-field-label" for="wpforms-10764-field_18">Dietary restrictions</label><input type="text" id="wpforms-10764-field_18" class="wpforms-field-large" name="wpforms[fields][18]" placeholder="Vegetarian or other restrictions" aria-errormessage="wpforms-10764-field_18-error" ></div><div id="wpforms-10764-field_23-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="23"><label class="wpforms-field-label" for="wpforms-10764-field_23">Is parking required? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-10764-field_23" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][23]" required="required"><option value="" class="placeholder" disabled  selected='selected'>Is parking required?</option><option value="Yes" >Yes</option><option value="No" >No</option></select></div><div id="wpforms-10764-field_24-container" class="wpforms-field wpforms-field-select wpforms-field-select-style-classic" data-field-id="24"><label class="wpforms-field-label" for="wpforms-10764-field_24">Need Travel arrangement back to Nangang Exhibition Center, Hall 2 ? <span class="wpforms-required-label" aria-hidden="true">*</span></label><select id="wpforms-10764-field_24" class="wpforms-field-large wpforms-field-required" name="wpforms[fields][24]" required="required"><option value="" class="placeholder" disabled >Need Travel arrangement back to Nangang Exhibition Center, Hall 2 ?</option><option value="Yes" >Yes</option><option value="No"  selected='selected'>No</option></select></div><div id="wpforms-10764-field_25-container" class="wpforms-field wpforms-field-text" data-field-id="25"><label class="wpforms-field-label" for="wpforms-10764-field_25">Business Contact Person</label><input type="text" id="wpforms-10764-field_25" class="wpforms-field-large" name="wpforms[fields][25]" placeholder="Please input Name of Business Contact Person" aria-errormessage="wpforms-10764-field_25-error" ></div><div id="wpforms-10764-field_26-container" class="wpforms-field wpforms-field-gdpr-checkbox" data-field-id="26"><label class="wpforms-field-label">GDPR Agreement <span class="wpforms-required-label" aria-hidden="true">*</span></label><ul id="wpforms-10764-field_26" class="wpforms-field-required"><li class="choice-1"><input type="checkbox" id="wpforms-10764-field_26_1" name="wpforms[fields][26][]" value="I consent to having this website store my submitted information so they can respond to my inquiry." aria-errormessage="wpforms-10764-field_26_1-error" required ><label class="wpforms-field-label-inline" for="wpforms-10764-field_26_1">I consent to having this website store my submitted information so they can respond to my inquiry.</label></li></ul></div></div><!-- .wpforms-field-container --><div class="wpforms-recaptcha-container wpforms-is-recaptcha wpforms-is-recaptcha-type-v3" ><input type="hidden" name="wpforms[recaptcha]" value=""></div><div class="wpforms-submit-container" ><input type="hidden" name="wpforms[id]" value="10764"><input type="hidden" name="page_title" value=""><input type="hidden" name="page_url" value="https://cybersecthreat.com/feed/"><button type="submit" name="wpforms[submit]" id="wpforms-submit-10764" class="wpforms-submit" data-alt-text="Sending registration information..." data-submit-text="Submit registration information" aria-live="assertive" value="wpforms-submit">Submit registration information</button><img loading="lazy" decoding="async" src="https://cybersecthreat.com/wp-content/plugins/wpforms/assets/images/submit-spin.svg" class="wpforms-submit-spinner" style="display: none;" width="26" height="26" alt="Loading"></div></form></div>  <!-- .wpforms-container --></div></div>
  557. </div></div><figure class="wp-block-kadence-image kb-image10544_2467e0-c8 size-large"><img loading="lazy" decoding="async" width="1024" height="219" src="https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded-Future-x-CyberSecThreat-min-1024x219.png" alt="Recorded Future x CyberSecThreat" class="kb-img wp-image-10618" srcset="https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded-Future-x-CyberSecThreat-min-1024x219.png 1024w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded-Future-x-CyberSecThreat-min-300x64.png 300w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded-Future-x-CyberSecThreat-min-768x164.png 768w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded-Future-x-CyberSecThreat-min-1536x328.png 1536w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded-Future-x-CyberSecThreat-min-2048x437.png 2048w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded-Future-x-CyberSecThreat-min-18x4.png 18w, https://cybersecthreat.com/wp-content/uploads/2023/04/Recorded-Future-x-CyberSecThreat-min-600x128.png 600w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption>Recorded Future x CyberSecThreat</figcaption></figure><p class="kt-adv-heading10544_ae9a6f-db wp-block-kadence-advancedheading" data-kb-block="kb-adv-heading10544_ae9a6f-db">Event highlights: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7065279260533399552/?actorCompanyId=80711215">https://www.linkedin.com/feed/update/urn:li:activity:7065279260533399552/?actorCompanyId=80711215</a></p><p>The post <a href="https://cybersecthreat.com/2023/04/05/cxo-round-table-event-on-cti-09-may-2023/">CXO Round Table Event on CTI, 09 May 2023</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  558. ]]></content:encoded>
  559. </item>
  560. <item>
  561. <title>CyberSecThreat Joins Taiwan CYBERSEC 2023 Exhibition Event</title>
  562. <link>https://cybersecthreat.com/2023/04/05/cybersecthreat-joins-taiwan-cybersec-2023-exhibition-event/</link>
  563. <comments>https://cybersecthreat.com/2023/04/05/cybersecthreat-joins-taiwan-cybersec-2023-exhibition-event/#respond</comments>
  564. <dc:creator><![CDATA[CyberSecThreat Editor Team]]></dc:creator>
  565. <pubDate>Wed, 05 Apr 2023 11:03:16 +0000</pubDate>
  566. <category><![CDATA[CTI]]></category>
  567. <category><![CDATA[Cyber Threat Intelligence]]></category>
  568. <category><![CDATA[Events]]></category>
  569. <category><![CDATA[News]]></category>
  570. <category><![CDATA[Threat Intelligence]]></category>
  571. <guid isPermaLink="false">https://cybersecthreat.com/?p=10532</guid>
  572.  
  573. <description><![CDATA[<p>CyberSecThreat, a leading provider of cybersecurity solutions and services, is proud to announce its participation in the Taiwan CYBERSEC 2023 exhibition event. The event will take place from May 9-11, 2023, at the Taipei Nangang Exhibition Center, Hall 2. This will be the first cybersecurity exhibition event to resume normally since the outbreak of the...</p>
  574. <p>The post <a href="https://cybersecthreat.com/2023/04/05/cybersecthreat-joins-taiwan-cybersec-2023-exhibition-event/">CyberSecThreat Joins Taiwan CYBERSEC 2023 Exhibition Event</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  575. ]]></description>
  576. <content:encoded><![CDATA[<p>CyberSecThreat, a leading provider of cybersecurity solutions and services, is proud to announce its participation in the Taiwan CYBERSEC 2023 exhibition event. The event will take place from May 9-11, 2023, at the Taipei Nangang Exhibition Center, Hall 2. This will be the first cybersecurity exhibition event to resume normally since the outbreak of the COVID-19 pandemic. CyberSecThreat&#8217;s booth number is C223, and the company looks forward to showcasing its latest cybersecurity offerings to attendees.</p><p>The Taiwan CYBERSEC exhibition is an important event in the cybersecurity industry, bringing together leading cybersecurity companies, government agencies, and industry experts to share their insights, experiences, and knowledge. With cyber threats becoming increasingly sophisticated and frequent, it is essential for organizations to stay ahead of the game by leveraging the latest cybersecurity solutions and services.</p><p>CyberSecThreat has been at the forefront of providing cutting-edge cybersecurity solutions to its clients globally. The company offers a range of solutions, including Recorded Future&#8217;s CTI platform, Security Orchestration, Automation and Response (SOAR), User and Entity Behavior Analytics (UEBA), Digital Forensics, Incident Response (DFIR), Cybersecurity Consulting, and more.</p><p>At the Taiwan CYBERSEC 2023 exhibition event, CyberSecThreat will showcase its latest cybersecurity solutions and services, the main focus is Recorded Future, a leading provider of cyber threat intelligence (CTI). Cyber threat intelligence is critical in today&#8217;s cybersecurity landscape as cyber threats become increasingly sophisticated and frequent. CTI provides organizations with insights and information on potential threats, allowing them to proactively mitigate risks and protect their assets. We will also showcase other cybersecurity solutions including the SOAR platform, which provides a centralized platform for threat detection and response, and its UEBA solution, which uses machine learning and advanced analytics to detect anomalous behavior and identify potential threats. CyberSecThreat will also demonstrate its advanced incident response capabilities, including its digital forensics and data recovery solutions.</p><p>&#8220;We are excited to participate in the Taiwan CYBERSEC 2023 exhibition event, which marks the first major cybersecurity event since the COVID-19 pandemic,&#8221; said Kelvin Yip, CEO of CyberSecThreat. &#8220;We look forward to showcasing our latest cybersecurity solutions and services to attendees and sharing our insights on how organizations can stay ahead of the ever-evolving cyber threat landscape.&#8221;</p><p>CyberSecThreat has a strong track record of providing cybersecurity solutions and services to organizations globally, including Fortune 500 companies, Forbes 2000 companies, government agencies, and other leading organizations. With its deep expertise and advanced technology solutions, CyberSecThreat is well-positioned to help organizations stay protected against cyber threats and ensure business continuity.</p><p>For more information on CyberSecThreat&#8217;s participation in the Taiwan CYBERSEC 2023 exhibition event, visit <a href="https://cyber.ithome.com.tw/2023/exhibition-page/1510">here</a> or register for free on the event&#8217;s website <a href="https://signupcybersec.ithome.com.tw/signup/2023/?utm_source=email&amp;utm_medium=edm-sponsor&amp;utm_campaign=edm-%E5%A5%87%E8%B3%87%E5%AE%89">here</a>.</p><p>Event highlights: <a href="https://www.linkedin.com/posts/cybersecthreat-corporation-limited_recorded-future-x-cybersecthreat-%E5%A5%87%E8%B3%87%E5%AE%89-at-2023-activity-7064560073636773888-k9QR/?utm_source=share">https://www.linkedin.com/posts/cybersecthreat-corporation-limited_recorded-future-x-cybersecthreat-%E5%A5%87%E8%B3%87%E5%AE%89-at-2023-activity-7064560073636773888-k9QR/?utm_source=share</a></p><div class="kb-gallery-wrap-id-10532_ee99a1-77 alignnone wp-block-kadence-advancedgallery"><div class="kb-gallery-ul kb-gallery-non-static kb-gallery-type-slider kb-gallery-id-10532_ee99a1-77 kb-gallery-caption-style-below kb-gallery-filter-none kb-gallery-magnific-init" data-image-filter="none" data-lightbox-caption="true"><div class="kt-blocks-carousel kt-carousel-container-dotstyle-none"><div class="kt-blocks-carousel-init kb-blocks-slider kt-carousel-arrowstyle-whiteondark kt-carousel-dotstyle-none" data-slider-anim-speed="400" data-slider-scroll="1" data-slider-arrows="true" data-slider-fade="false" data-slider-dots="false"data-slider-type="slider"  data-slider-hover-pause="false" data-slider-auto="1" data-slider-speed="4500"><div class="kb-slide-item kb-gallery-slide-item"><div class="kadence-blocks-gallery-item"><div class="kadence-blocks-gallery-item-inner"><figure class="kb-gallery-figure kb-gallery-item-has-link kadence-blocks-gallery-item-has-caption" "><a href="https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1.png" data-description="CYBERSEC 2023 Booth number of CyberSecThreat: C223" class="kb-gallery-item-link"  ><div class="kb-gal-image-radius"><div class="kb-gallery-image-contain kadence-blocks-gallery-intrinsic kb-gallery-image-ratio-inherit kb-has-image-ratio-inherit" ><img loading="lazy" decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%201000%20667'%3E%3C/svg%3E"  data-splide-lazy="https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1.png" width="2560" height="1344" alt="" data-full-image="https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1.png" data-light-image="https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1.png" data-splide-lazy-srcset="https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1.png 2560w, https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1-300x158.png 300w, https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1-1024x538.png 1024w, https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1-768x403.png 768w, https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1-1536x807.png 1536w, https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1-2048x1075.png 2048w, https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1-18x9.png 18w, https://cybersecthreat.com/wp-content/uploads/2023/04/C223_1200x630-01-1-600x315.png 600w" sizes="auto, (max-width: 2560px) 100vw, 2560px"data-id="10788" class="wp-image-10788 skip-lazy"/></div></div><div class="kadence-blocks-gallery-item__caption">CYBERSEC 2023 Booth number of CyberSecThreat: C223</div></a></figure></div></div></div><div class="kb-slide-item kb-gallery-slide-item"><div class="kadence-blocks-gallery-item"><div class="kadence-blocks-gallery-item-inner"><figure class="kb-gallery-figure kb-gallery-item-has-link kadence-blocks-gallery-item-has-caption" "><a href="https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引.jpg" data-description="奇資安 攤位 路線指引" class="kb-gallery-item-link"  ><div class="kb-gal-image-radius"><div class="kb-gallery-image-contain kadence-blocks-gallery-intrinsic kb-gallery-image-ratio-inherit kb-has-image-ratio-inherit" ><img loading="lazy" decoding="async" src="data:image/svg+xml,%3Csvg%20xmlns='http://www.w3.org/2000/svg'%20viewBox='0%200%201000%20667'%3E%3C/svg%3E"  data-splide-lazy="https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引.jpg" width="1663" height="1422" alt="" data-full-image="https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引.jpg" data-light-image="https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引.jpg" data-splide-lazy-srcset="https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引.jpg 1663w, https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引-300x257.jpg 300w, https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引-1024x876.jpg 1024w, https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引-768x657.jpg 768w, https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引-1536x1313.jpg 1536w, https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引-14x12.jpg 14w, https://cybersecthreat.com/wp-content/uploads/2023/04/路線指引-600x513.jpg 600w" sizes="auto, (max-width: 1663px) 100vw, 1663px"data-id="10791" class="wp-image-10791 skip-lazy"/></div></div><div class="kadence-blocks-gallery-item__caption">奇資安 攤位 路線指引</div></a></figure></div></div></div></div></div></div></div><p>The post <a href="https://cybersecthreat.com/2023/04/05/cybersecthreat-joins-taiwan-cybersec-2023-exhibition-event/">CyberSecThreat Joins Taiwan CYBERSEC 2023 Exhibition Event</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  577. ]]></content:encoded>
  578. <wfw:commentRss>https://cybersecthreat.com/2023/04/05/cybersecthreat-joins-taiwan-cybersec-2023-exhibition-event/feed/</wfw:commentRss>
  579. <slash:comments>0</slash:comments>
  580. </item>
  581. <item>
  582. <title>Ingest logs into Splunk using TLS</title>
  583. <link>https://cybersecthreat.com/2023/04/05/ingest-logs-into-splunk-using-tls/</link>
  584. <comments>https://cybersecthreat.com/2023/04/05/ingest-logs-into-splunk-using-tls/#respond</comments>
  585. <dc:creator><![CDATA[Kelvin Yip]]></dc:creator>
  586. <pubDate>Tue, 04 Apr 2023 16:26:21 +0000</pubDate>
  587. <category><![CDATA[Blue Team]]></category>
  588. <category><![CDATA[SOC]]></category>
  589. <category><![CDATA[Splunk]]></category>
  590. <guid isPermaLink="false">https://cybersecthreat.com/?p=5055</guid>
  591.  
  592. <description><![CDATA[<p>In today&#8217;s digital world, organizations are generating massive amounts of log data that contain valuable insights into their systems, applications, and networks. Splunk is a popular platform that helps organizations analyze and visualize this log data to gain insights and improve their operations. Today we are going to discuss ingesting syslog from FireEye HX Cloud...</p>
  593. <p>The post <a href="https://cybersecthreat.com/2023/04/05/ingest-logs-into-splunk-using-tls/">Ingest logs into Splunk using TLS</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  594. ]]></description>
  595. <content:encoded><![CDATA[<p>In today&#8217;s digital world, organizations are generating massive amounts of log data that contain valuable insights into their systems, applications, and networks. Splunk is a popular platform that helps organizations analyze and visualize this log data to gain insights and improve their operations. </p><p>Today we are going to discuss ingesting syslog from FireEye HX Cloud into Splunk so that we can get additional insights into authentication logs, system logs, containment logs, and other audit trails. If you need to ingest syslog from FireEye HX Cloud into Splunk, you need to ingest the log via Transport Layer Security (TLS).</p><p>In this blog post, we are going to discuss two methods to ingest logs to Splunk using TLS based on CentOS: TCP SSL input for Splunk and Rsyslog with GTLS. Each method has its own set of advantages and disadvantages, so it&#8217;s important to evaluate which option is best suited for your organization&#8217;s specific needs.</p><p>TCP SSL input for Splunk is relatively straightforward to set up, but it has a potential drawback: Log Loss. When the Splunk instance is restarted, any logs that were in transit during the restart will be lost.</p><h2 class="wp-block-heading" id="h-tcp-ssl-input-for-splunk">TCP SSL input for Splunk</h2><p>To set up TCP SSL input for Splunk, you will need to: </p><p><strong>Open port 6514/tcp in your firewall</strong>:</p><div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained"><p><code>firewall-cmd --permanent --zone=public --add-port=6514/tcp</code></p>
  596.  
  597. <p><code>firewall-cmd --reload</code></p></div></div><p><strong>Create a combined certificate file from your authentication and private key files</strong></p><div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained"><div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained"><div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained"><p><code>cat /etc/auth/cert.pem &gt; /opt/splunk/etc/auth/splunkweb_combined.cer</code></p>
  598.  
  599. <p><code>cat /etc/auth/privkey.pem &gt;&gt; /opt/splunk/etc/auth/splunkweb_combined.cer</code></p>
  600.  
  601. <p><code>chown splunk:splunk /opt/splunk/etc/auth/splunkweb_combined.cer</code></p>
  602.  
  603. <p><code>chmod 600 /opt/splunk/etc/auth/splunkweb_combined.cer</code></p></div></div></div></div></div></div><p><strong>Edit the inputs.conf file with the necessary configurations (vi /opt/splunk/etc/system/local/inputs.conf</strong>)<strong>:</strong></p><div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained"><p><code>[tcp-ssl://1514]</code></p>
  604.  
  605. <p><code>sourcetype = syslog</code></p>
  606.  
  607. <p><code>index = security</code></p>
  608.  
  609. <p><code>disabled = false</code></p>
  610.  
  611. <p><code>acceptFrom = &lt;IP Address of FireEye&gt;</code></p>
  612.  
  613. <p><code>[SSL]</code></p>
  614.  
  615. <p><code>password =</code></p>
  616.  
  617. <p><code>requireClientCert = false</code></p>
  618.  
  619. <p><code>serverCert = /opt/splunk/etc/auth/splunkweb_combined.cer</code></p>
  620.  
  621. <p><code>sslVersions = tls1.2</code></p>
  622.  
  623. <p><code>cipherSuite = AES256-SHA</code></p>
  624.  
  625. <h2 class="wp-block-heading" id="h-rsyslog-with-gtls">Rsyslog with GTLS</h2></div></div><p>Rsyslog with GTLS is a more involved setup process but has the advantage of being less prone to log loss. To set up Rsyslog with GTLS, you will need to:</p><p><strong>Open port 6514/tcp in your firewall</strong></p><div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained"><p><code>firewall-cmd --permanent --zone=public --add-port=6514/tcp</code></p>
  626.  
  627. <p><code>firewall-cmd --reload</code></p></div></div><p><strong>Install the necessary packages</strong></p><p><code>yum -y install rsyslog-gnutls rsyslog gnutls-utils gnutls</code></p><p><strong>copy your authentication and private key files to the appropriate locations</strong></p><div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained"><p><code>cp /etc/auth/privkey.pem /etc/pki/tls/private/rslserver-key.pem</code></p>
  628.  
  629. <p><code>cp /etc/auth/cert.pem /etc/pki/tls/certs/rslserver-cert.pem</code></p></div></div><p><strong>Edit the rsyslog.conf file with the necessary configurations</strong> (vi /etc/rsyslog.conf):</p><div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained"><p><code>global(</code></p>
  630.  
  631. <p><code>DefaultNetstreamDriver="gtls"</code></p>
  632.  
  633. <p><code>DefaultNetstreamDriverCertFile="/etc/pki/tls/certs/rslserver-cert.pem"</code></p>
  634.  
  635. <p><code>DefaultNetstreamDriverKeyFile="/etc/pki/tls/private/rslserver-key.pem"</code></p>
  636.  
  637. <p><code>)</code></p>
  638.  
  639. <p><code>module(load="imptcp" threads="3")</code></p>
  640.  
  641. <p><code>module(</code></p>
  642.  
  643. <p><code>load="imtcp"</code></p>
  644.  
  645. <p><code>StreamDriver.Name="gtls"</code></p>
  646.  
  647. <p><code>#StreamDriver.Name="ossl"</code></p>
  648.  
  649. <p><code>StreamDriver.Mode="1"</code></p>
  650.  
  651. <p><code>StreamDriver.Authmode="anon"</code></p>
  652.  
  653. <p><code>)</code></p>
  654.  
  655. <p><code>input(type="imptcp" port="514")</code></p>
  656.  
  657. <p><code>input(type="imtcp" port="6514")</code></p></div></div><p>Once you have determined which method to use, you can begin the process of ingesting logs from FireEye HX Cloud into Splunk. With TLS in place, you can be confident that your logs are secure and protected from potential security risks.</p><p>It&#8217;s important to note that these instructions are specific to FireEye HX Cloud, but they can be adapted for other sources of log ingestion into Splunk. As always, it&#8217;s important to stay up to date on the latest security best practices and to continually evaluate and update your security measures to ensure that your organization&#8217;s data is protected.</p><p>Reference:</p><p><a href="https://github.com/CyberSecThreat-Corporation-Limited/Splunk/blob/under-review/rsyslog-ssl-rh7.conf">https://github.com/CyberSecThreat-Corporation-Limited/Splunk/blob/under-review/rsyslog-ssl-rh7.conf</a></p><p><a href="https://github.com/CyberSecThreat-Corporation-Limited/Splunk/blob/under-review/rsyslog-ssl_rh8.conf">https://github.com/CyberSecThreat-Corporation-Limited/Splunk/blob/under-review/rsyslog-ssl_rh8.conf</a></p><p>The post <a href="https://cybersecthreat.com/2023/04/05/ingest-logs-into-splunk-using-tls/">Ingest logs into Splunk using TLS</a> appeared first on <a href="https://cybersecthreat.com">CyberSecThreat</a>.</p>
  658. ]]></content:encoded>
  659. <wfw:commentRss>https://cybersecthreat.com/2023/04/05/ingest-logs-into-splunk-using-tls/feed/</wfw:commentRss>
  660. <slash:comments>0</slash:comments>
  661. </item>
  662. </channel>
  663. </rss>
  664.  

If you would like to create a banner that links to this page (i.e. this validation result), do the following:

  1. Download the "valid RSS" banner.

  2. Upload the image to your own server. (This step is important. Please do not link directly to the image on this server.)

  3. Add this HTML to your page (change the image src attribute if necessary):

If you would like to create a text link instead, here is the URL you can use:

http://www.feedvalidator.org/check.cgi?url=https%3A//cybersecthreat.com/feed/

Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda