Syed Ubaid Ali Jafri
Syed Ubaid Ali Jafri
  • Видео 24
  • Просмотров 2 185
Cybersec Asia Quick highlights of the session “Building Cyber Resilience for organisational Agility”
The session describes importance of having and not having a cyber resilience strategy. It not only emphasis on the framework but also answer WHAT to do to be cyber resilient and HOW to do. #cybersecurity #cybersecasia
Просмотров: 4

Видео

CyberSec Asia 2025 - Building Cyber Resilience for Organisational Agility
Просмотров 23914 дней назад
CyberSec Asia 2025 - Building Cyber Resilience for Organisational Agility
Identifying Vulnerabilities Before Attackers Do
Просмотров 14Месяц назад
As cyber threats become increasingly sophisticated, organizations must evolve their defense strategies to stay protected. Offensive security, which focuses on identifying and mitigating vulnerabilities before attackers can exploit them, is a crucial aspect of modern cybersecurity. The session will guide on how we can stay a head from hacker and making our organizations secure in cyberspace
Attacks using AI - Adversarial attacks & defenses
Просмотров 133 месяца назад
The session focuses on voice cloning using AI technique and algorithm can be easy for a hacker to learn about deception in the context of an attack .
Insider Threat - Detection & Mitigation
Просмотров 42Год назад
- The Session covers types and categories of Insider threats - Detecting an Insider - Using OSINT to know if an Insider is already compromised. - Triggering an alert by Integrating Use caaes in SIEM.
AI in Offensive Security - ITCN Asia Karachi 2023.
Просмотров 71Год назад
AI in Offensive Security - ITCN Asia Karachi 2023.
Deception of Data Leakage Prevention Technology.
Просмотров 39Год назад
Deception of Data Leakage Prevention Technology.
Third Party Supply Chain Risk to the Industry.
Просмотров 34Год назад
Third Party Supply Chain Risk to the Industry.
Global Threat Emulator
Просмотров 272 года назад
This project highlights threats that are being encountered by different organization including Banking, FMCG, Textile, Oil & Gas, Government etc. This project will help to identify how many open threats are still exists and may impact the organizations. the organizations need to list down what remedial steps have been taken by them in order to secure themselves from known market cyber threats. ...
Automated Audit Simulation
Просмотров 262 года назад
This is an automated tool design to perform simulations related to Audit, it is a detailed checklist containing various questions and on the basis of certain answers the outcome of a department and / or a company is published on real-time basis. The project takes input from the users against every question and than automatically calculate the weightage to those questions as a result it will pop...
Unique Vulnerabilities Databank
Просмотров 272 года назад
This is a project developed in Data Studio Google, it helps to identify unique vulnerabilities which are not in CVE, CWE list but can cause significant impact if they are not being patched. Vulnerabilities that are more associated with hardware, software, and operating system are more focused while assessing the project. The project also contains "Sector wise" bifurcation, it can further be fil...
Cybersecurity awareness Session
Просмотров 382 года назад
Delivered a cybersecurity awareness session at Jinnah University Of Women on 19-Nov-2022, At Karachi,Pakistan
Cybersecurity awareness Session
Просмотров 332 года назад
Delivered Cybersecurity awareness session to Women at Jinnah University on 19th Nov, 2022 karachi Pakistan
Cyber warfare- A clear and present danger.
Просмотров 282 года назад
Cyber warfare- A clear and present danger.
Cyber attacks and Risk of Bank Failures
Просмотров 812 года назад
Cyber attacks and Risk of Bank Failures
Seminars Conducted from 2017 - 2022
Просмотров 292 года назад
Seminars Conducted from 2017 - 2022
Mobile Phone Forensic - Android Forensic
Просмотров 5802 года назад
Mobile Phone Forensic - Android Forensic
Malware Analysis Using Cuckoo Sandbox
Просмотров 3952 года назад
Malware Analysis Using Cuckoo Sandbox
File Shredding - Anti Forensic Technique
Просмотров 1112 года назад
File Shredding - Anti Forensic Technique
Conducting Database Forensic | Digital Forensic
Просмотров 922 года назад
Conducting Database Forensic | Digital Forensic
An Informative Session about Cyber Bullying / Cyberharrasment
Просмотров 702 года назад
An Informative Session about Cyber Bullying / Cyberharrasment
Compromising a Mobile Device
Просмотров 532 года назад
Compromising a Mobile Device

Комментарии