Empowering the next generation of IT Experts with mint:pink at LHIND! 🚀 The #mintprogram aims to break down stereotypes and introduce girls to the world of technology. In countries like Albania, women are already equally represented in IT – a goal we strive to achieve here as well. During their visit, the participants experienced the world of cyber security up close: 👩🏽💻Guided by IT security consultant Lisa Ulbrich, they discovered security vulnerabilities and learned how to protect against digital attacks. 💻 The highlight? Web fuzzing, where multiple inputs are placed behind the URL to find website weaknesses. Lena, a participant, exclaimed, “This is the best thing I’ve ever done with a computer.” 🌟👩🏼💻 Many thanks to Manuela Oelke, who took the time to answer all the questions and Ina-Lotte Dühring for the organisation. We are proud to support such programs and foster the next generation of IT experts. 🚀 More information to this event here: https://lnkd.in/esAbMKfS 📸 Claudia Höhne #WomenInTech #CyberSecurity #ExploreLufthansaIndustrySolutions #LufthansaGroup
Lufthansa Industry Solutions’ Post
More Relevant Posts
-
Hello, Wonderful Women of Africa! Ever explored Cyber Deception Technology? This smart tactic involves setting traps and decoys in networks to catch and divert cyber attacks. By leading attackers into fake environments, we learn their moves while safeguarding our assets. Cyber deception acts as our digital shield, helping us stay ahead of threats. Think of your network as a secure hideaway, not just with strong defenses but also with clever illusions. As cyber intruders navigate, they encounter fake data and traps, giving us insights to outsmart them. At Cyber Chicks Academy, we're on a mission to empower women in Africa with cyber skills. Join us to dive into this field and become cybersecurity experts! #CyberDeception #CyberSecurity #TechInnovation #CyberChicksAcademy #WomenInTech #FutureOfTech #STEM #TechEducation #Empowerment #DigitalTransformation #Africa
To view or add a comment, sign in
-
-
A team from CMU-Africa's CyLab-Africa/Upanzi Network found that 83% of digital square global goods used in the health sector included secrets that were at risk of being exposed. The team includes Theoneste Byagutangaza ,Junias BONOU and Hirwa Emmanuel. The research group's goal is to advocate that software developers practice better cybersecurity, which can be accomplished by making the products secure by design. Security by design is an approach in which software is created from the beginning of the design process to withstand attacks, and advocating for it is a key part of the Upanzi Network's mission to contribute to the open-source community. Read more: https://lnkd.in/dCrXQiih #Cybersecurity #DigitalHealth #OpenSource #SoftwareSecurity #DataProtection #ResearchAtCMUAfrica
To view or add a comment, sign in
-
-
MWR is one of the proud sponsors of BSides Cape Town, which is taking place at UCT GSB Conference Centre at the Breakwater Lodge in the stunning V&A Waterfront on 2 December 2023. This volunteer-organized event fosters community-driven conversations with practical demos, deviating from traditional lecture-style cons. Several MWR Cyber Security Consultants, including Tinus Green, Head of Consultancy, will present captivating talks. Tinus explores Active Directory Certificate Services (AD CS) in 'Let the Children Play - Leveraging AD CS for Persistence and Profit in Parent-Child Configured Forests.' Uncover insights on AD CS, default permission misconfigurations, and live demos revealing exploitation potency. Jonathon Everatt dives into 'The Wide World of Consent,' unraveling consent phishing in the cloud tech era. Witness live demos showcasing consent phishing abuse, controls, bypass mechanisms, and attacker achievements with consent. Connor du Plooy unveils 'ed2root - How Ancient IPC Mechanisms Can Benefit You Today.' Join him to discover a macOS text editor vulnerability persisting for 8 years, its presence in other packages, and insights on identifying and exploiting it. Don't miss these talks and demos, offering a deep dive into cybersecurity vulnerabilities and solutions. Best wishes to our presenters! #bsidescapetown #cybersecuritytalks #livedemos #activedirectory #phishing #ed2root #exploringvulenarabilities #mwrcybersecurity #informationsecurity
To view or add a comment, sign in
-
-
Did you know it is CyberNI Week 2024? The week offers a range of events aimed at raising cyber security awareness locally. Find out more at: https://lnkd.in/e-QSF-JE #CyberNIWeek24 #cybersecurity
To view or add a comment, sign in
-
Cyberspace is not all about butterflies and rainbows, pardon, data, fancy digital tools and features. It is full of scams, phishing and cyberbullying, too. I am happy to cover a very important topic at #BSidesYerevan2024, come and join us, and let's explore the dark side and figure out how to protect ourselves, our business and our loved ones. #GTArmenia #PartnerforGrowth #thoughtleadership #securitybsides #bsidesyerevan2024 #CybersecurityConference #TechEventArmenia
💥Join us in welcoming Olga Semyonova from Grant Thornton Armenia to #BSidesYerevan2024! 📝 Topic: "Thoughts on Protecting Individuals through Awareness" In today's digital landscape, individual cybersecurity awareness is paramount. Olga will share her insights on empowering individuals with the knowledge and tools to protect themselves against ever-evolving cyber threats. Don't miss this invaluable opportunity to learn how to strengthen your personal cybersecurity defenses and contribute to a more secure digital ecosystem for all. ❗️Secure your spot at #BSidesYerevan2024; https://bit.ly/3w09Zyv #securitybsides #bsidesyerevan2024 #CybersecurityConference #TechEventArmenia #securitybsides
To view or add a comment, sign in
-
-
Managing Director at TERRA | 2024 Cohort - Global Summit Mentor at FORA | Program Manager at Open Data Innovation Institute I Board Member at Based In Science
Here's a summary of the webinar session on women in cybersecurity, featuring the remarkable journeys of Drenusha, Gonxhe, and Luanda, filled with challenges faced as women and achievements in the cyber world. Thank you for your inspiring presentations and valuable insights shared with all of us! 🛡️ A big thank you to the teams of Open Data Innovation, Women4Cyber Kosovo, and Based In Science for their dedication and hard work in organizing it and all participants for their attendance! Looking forward to seeing you again in the future and making contributions together beyond the field of cybersecurity.🔐 #womenincyber #webinar #cybersecurity
To view or add a comment, sign in
-
🏆ISC2 Global Achievement Award: Senior Professional for EMEA 2023 | CISSP | CISA | CEH | PCI DSS QSA | CDPSE | ISO 27001
The story of Jia Tan and the fabricated identities behind sophisticated attacks. I got invited by Elena Georgiou Strouthos to the Breaking the 20% podcast to listen and contribute to her story about the XZ Utils backdoor. This podcast is about the stories of hidden heroes, the women in tech. #womenintech #xzutils #jiatan #podcast #cybersecurity
This week Andreas Constantinides, a renowned cybersecurity expert, joins me to help me uncover the alarming case of Jia Tan—a fabricated identity at the center of a sophisticated cyber espionage operation. Andreas lends his extensive expertise as we analyze how Jia Tan, seemingly a diligent contributor to open-source projects like XZ Utils, was a cover for a collective executing a long-term backdoor placement in critical software infrastructure. This episode not only explores the broader implications of trust and security in the open-source community but also discusses the fact that female personas are commonly used by hackers in long-sting operations. Join us as we piece together the digital puzzle that nearly compromised millions of servers worldwide. #womenintech #cybersecurity #xzutils #jiatan Elena Georgiou Strouthos
Breaking the 20% - Season 2 - Episode 21 - Jia Tan, XZ Utils and the perils of trust
breaking20.eu
To view or add a comment, sign in
-
The innovative nations of India and Israel are prioritizing #CyberSecurity in their respective fields. As an Israel-based cybersecurity firm, we at #Coralogix are proud to play a part in this expanding strategic cyber partnership. 🇮🇳 🇮🇱 🫱🏻🫲🏼 Read more about the growing Indo-Israeli alliance and Coralogix's contribution here. Questions about Coralogix? Tag me in the comments below.
Understanding the growing Indo-Israeli strategic cyber partnership
mei.edu
To view or add a comment, sign in
-
Attended this training last week and left as a different person on matters pertaining Data Protection & Cyber Security. The Cyber Shujaa training provided insights on the Data Protection Act(2019), GDPR and many other laws both local and within other jurisdictions on Data Protection and their application. #cyberawareness #dataprotection
🔒✨Celebrating Success! Our Data Protection Masterclass & Women-Only Cybersecurity Masterclass were smashing hits last week! 🎉 As Cyber Shujaa, we couldn't be prouder of the incredible turnout and engagement in both events. 📚 DATA PROTECTION MASTERCLASS: Empowering participants with the latest insights on safeguarding sensitive information and defending against cyber threats. Together, we're building a safer digital world! 👩🎓 WOMEN-ONLY CYBERSECURITY MASTERCLASS: Uniting brilliant minds and breaking barriers! We witnessed unparalleled passion and talent in our exclusive women's event, fostering diversity in the cybersecurity domain. A heartfelt thank you to all our exceptional speakers, attendees, and partners who made these masterclasses a grand success! 🙏 Stay tuned for more empowering sessions to come! #DataProtection #CybersecurityLeaders #EmpowermentInTech
To view or add a comment, sign in
-
-
Talent Sourcer @ SentinelOne | The Future of CyberSec will be determined by You - let's Secure Tomorrow together! 🛡️👾 | In 💜 with s1.ai/PurpleAI
🎥🔴🛡️Interested to hear how to handle cyber incidents & what are the intricacies? Join a webinar with the outstanding women of SentinelOne, tomorrow at 8 PM CET! You'll gain insights into the POVs of various stakeholders, stages of a response, from detecting the problem to immediate actions, as well as long-term valuable lessons learned. The #webinar is organized as a part of our partnership with Women in CyberSecurity (WiCyS). Don't miss this opportunity & register at the link in comments 👇
To view or add a comment, sign in
-