Beste bezoeker, u bezoekt onze website met Internet Explorer. Deze browser wordt niet meer actief ondersteund door Microsoft en kan voor veiligheids- en weergave problemen zorgen. Voor uw veiligheid raden wij u aan om een courante browser te gebruiken, zoals Google Chrome of Microsoft Edge.
Search
Close this search box.
  • Nieuws
  • ISACA Square Table: Beyond Russian hackers

ISACA Square Table: Beyond Russian hackers

Ever wanted to investigate Moscow’s cyber landscape? Now you can. Join us at our first English Square Table, June 3rd at 19:00, hosted by Alex Bodryk.

Topics during the Square Table

  • Russia in Digital – brief overview or Russian digital economy and its key players (unicorns, digital government and so).
  • Regulation – expanding to Russia, what to expect from security regulation point of view when you are working for a bank, FMCG manufacturer or have to process a lot of personal data.
  • People – where ‘hackers’ live, how they are paid and whom they protect in Russia and beyond.
  • Technology – Russian cybersecurity tools and vendors landscape, excluding local compliance-focused ones, from globally recognized (Kaspersky-like) to new faces in trending product categories.

Speaker: Alex Bodryk, ISACA Moscow

Alex Bodryk, CISA, ITIL Expert is a cybersecurity specialist with 10 years experience serving major corporations in cybersecurity sphere (up to 180 000 seats). During his career he took part in projects within SOC, threat intelligence, DevSecOps, identity management and security awareness domains as a client, vendor, VAR, TI and MSS provider.

CPE (PE-Punten)

1 CPE

Inschrijven kan via deze link

Gerelateerde berichten

  • ISACA NL Journal ·

From Excel to Excellence: Revitalizing IT Risk Strategies for a Future-Ready Landscape

By Dave van Stein & Yianna Paris - Effective IT risk management is necessary to safeguard valuable assets, achieve organizational objectives, and ensure long-term success. When done properly, it is a crucial tool for informed decision-making. However, keeping up has become challenging in the modern fast changing world of Agile, cloud infrastructure, the massive use of external dependencies and complex and opaque supply chains, and daily changing threats.

Plaats een reactie

Deze site gebruikt Akismet om spam te verminderen. Bekijk hoe je reactie-gegevens worden verwerkt.

We gebruiken functionele en analytische cookies om ervoor te zorgen dat de website optimaal presteert. Als u doorgaat met het gebruik van deze site, gaan we ervan uit dat u hiermee akkoord gaat. Meer informatie vindt u in onze Privacyverklaring.