ºÝºÝߣshows by User: EGSCyber / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: EGSCyber / Mon, 28 Oct 2019 11:17:45 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: EGSCyber Cyber security colombo meetup /slideshow/cyber-security-colombo-meetup/187719388 cybersecuritycolombomeetup-191028111745
Public services such as electricity, water, hospital management and transport are important for the smooth functioning of our daily lives. The critical nature of these services make these systems a key target for cyber threats. This is why the public sector experiences more incidents than any other industry. Hence why the public sector needs to focus more on strengthening their cybersecurity strategies to address critical gaps – especially the devices used and policies governing their use. In this session, Asela addressed some of our critical services and how the lack of security focus has affected their use.]]>

Public services such as electricity, water, hospital management and transport are important for the smooth functioning of our daily lives. The critical nature of these services make these systems a key target for cyber threats. This is why the public sector experiences more incidents than any other industry. Hence why the public sector needs to focus more on strengthening their cybersecurity strategies to address critical gaps – especially the devices used and policies governing their use. In this session, Asela addressed some of our critical services and how the lack of security focus has affected their use.]]>
Mon, 28 Oct 2019 11:17:45 GMT /slideshow/cyber-security-colombo-meetup/187719388 EGSCyber@slideshare.net(EGSCyber) Cyber security colombo meetup EGSCyber Public services such as electricity, water, hospital management and transport are important for the smooth functioning of our daily lives. The critical nature of these services make these systems a key target for cyber threats. This is why the public sector experiences more incidents than any other industry. Hence why the public sector needs to focus more on strengthening their cybersecurity strategies to address critical gaps – especially the devices used and policies governing their use. In this session, Asela addressed some of our critical services and how the lack of security focus has affected their use. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritycolombomeetup-191028111745-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Public services such as electricity, water, hospital management and transport are important for the smooth functioning of our daily lives. The critical nature of these services make these systems a key target for cyber threats. This is why the public sector experiences more incidents than any other industry. Hence why the public sector needs to focus more on strengthening their cybersecurity strategies to address critical gaps – especially the devices used and policies governing their use. In this session, Asela addressed some of our critical services and how the lack of security focus has affected their use.
Cyber security colombo meetup from Eguardian Global Services
]]>
143 0 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritycolombomeetup-191028111745-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Big 4 W's of Big Threat Hunting /slideshow/big-4-ws-of-big-threat-hunting/150536411 big4wsofbigthreathunting-190619050249
Learn about Threat Hunting, why it matters, who it's useful for, when you should do it and to effectively conduct one.]]>

Learn about Threat Hunting, why it matters, who it's useful for, when you should do it and to effectively conduct one.]]>
Wed, 19 Jun 2019 05:02:49 GMT /slideshow/big-4-ws-of-big-threat-hunting/150536411 EGSCyber@slideshare.net(EGSCyber) Big 4 W's of Big Threat Hunting EGSCyber Learn about Threat Hunting, why it matters, who it's useful for, when you should do it and to effectively conduct one. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/big4wsofbigthreathunting-190619050249-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn about Threat Hunting, why it matters, who it&#39;s useful for, when you should do it and to effectively conduct one.
Big 4 W's of Big Threat Hunting from Eguardian Global Services
]]>
179 1 https://cdn.slidesharecdn.com/ss_thumbnails/big4wsofbigthreathunting-190619050249-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
eCon - What and Why? /slideshow/econ-what-and-why/139500073 shihan-190404053955
Community initiative is a must for the nation to stand strong and go forward. eCon. eCon is a platform where industry’s leaders, researchers, practitioners and enthusiasts can meet, exchange ideas and discuss strategies that will set the course for the future of Cyber Security ]]>

Community initiative is a must for the nation to stand strong and go forward. eCon. eCon is a platform where industry’s leaders, researchers, practitioners and enthusiasts can meet, exchange ideas and discuss strategies that will set the course for the future of Cyber Security ]]>
Thu, 04 Apr 2019 05:39:55 GMT /slideshow/econ-what-and-why/139500073 EGSCyber@slideshare.net(EGSCyber) eCon - What and Why? EGSCyber Community initiative is a must for the nation to stand strong and go forward. eCon. eCon is a platform where industry’s leaders, researchers, practitioners and enthusiasts can meet, exchange ideas and discuss strategies that will set the course for the future of Cyber Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/shihan-190404053955-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Community initiative is a must for the nation to stand strong and go forward. eCon. eCon is a platform where industry’s leaders, researchers, practitioners and enthusiasts can meet, exchange ideas and discuss strategies that will set the course for the future of Cyber Security
eCon - What and Why? from Eguardian Global Services
]]>
232 1 https://cdn.slidesharecdn.com/ss_thumbnails/shihan-190404053955-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Practical Security Monitoring with ELKStack /slideshow/practical-security-monitoring-with-elkstack/139499871 practicalsecuritymonitoringwithelkstackbyjanithmalinga-econ2019-190404053816
Understand the basics of the ELK stack and learn how to build a fully functional opensource SIEM using the ELK stack and few other opensource tools]]>

Understand the basics of the ELK stack and learn how to build a fully functional opensource SIEM using the ELK stack and few other opensource tools]]>
Thu, 04 Apr 2019 05:38:16 GMT /slideshow/practical-security-monitoring-with-elkstack/139499871 EGSCyber@slideshare.net(EGSCyber) Practical Security Monitoring with ELKStack EGSCyber Understand the basics of the ELK stack and learn how to build a fully functional opensource SIEM using the ELK stack and few other opensource tools <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/practicalsecuritymonitoringwithelkstackbyjanithmalinga-econ2019-190404053816-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Understand the basics of the ELK stack and learn how to build a fully functional opensource SIEM using the ELK stack and few other opensource tools
Practical Security Monitoring with ELKStack from Eguardian Global Services
]]>
771 1 https://cdn.slidesharecdn.com/ss_thumbnails/practicalsecuritymonitoringwithelkstackbyjanithmalinga-econ2019-190404053816-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Continuous monitoring with OSSIM /slideshow/continuous-monitoring-with-ossim/139499160 econossim-warunav1-190404053238
Learn how to manage your company’s security health using continuous monitoring with OSSIM, an Open Source Security Information and Event Management solution.]]>

Learn how to manage your company’s security health using continuous monitoring with OSSIM, an Open Source Security Information and Event Management solution.]]>
Thu, 04 Apr 2019 05:32:38 GMT /slideshow/continuous-monitoring-with-ossim/139499160 EGSCyber@slideshare.net(EGSCyber) Continuous monitoring with OSSIM EGSCyber Learn how to manage your company’s security health using continuous monitoring with OSSIM, an Open Source Security Information and Event Management solution. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/econossim-warunav1-190404053238-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Learn how to manage your company’s security health using continuous monitoring with OSSIM, an Open Source Security Information and Event Management solution.
Continuous monitoring with OSSIM from Eguardian Global Services
]]>
1175 2 https://cdn.slidesharecdn.com/ss_thumbnails/econossim-warunav1-190404053238-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to identify and prevent SQL injection /slideshow/how-to-identify-and-prevent-sql-injection/133832911 sqlinjection-colombocybersecuritymeetup-190301084705
• What is SQL injection ? • Why is it harmful? • Types of SQL injection attacks. • How to identify SQL injection vulnerability. • Exploiting SQL injection. • How to protect Web Application from SQL injection.]]>

• What is SQL injection ? • Why is it harmful? • Types of SQL injection attacks. • How to identify SQL injection vulnerability. • Exploiting SQL injection. • How to protect Web Application from SQL injection.]]>
Fri, 01 Mar 2019 08:47:05 GMT /slideshow/how-to-identify-and-prevent-sql-injection/133832911 EGSCyber@slideshare.net(EGSCyber) How to identify and prevent SQL injection EGSCyber • What is SQL injection ? • Why is it harmful? • Types of SQL injection attacks. • How to identify SQL injection vulnerability. • Exploiting SQL injection. • How to protect Web Application from SQL injection. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/sqlinjection-colombocybersecuritymeetup-190301084705-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> • What is SQL injection ? • Why is it harmful? • Types of SQL injection attacks. • How to identify SQL injection vulnerability. • Exploiting SQL injection. • How to protect Web Application from SQL injection.
How to identify and prevent SQL injection from Eguardian Global Services
]]>
582 1 https://cdn.slidesharecdn.com/ss_thumbnails/sqlinjection-colombocybersecuritymeetup-190301084705-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-EGSCyber-48x48.jpg?cb=1572260170 A global cyber security service provider with a vision to empower people and organizations through information sustainability in the digital era. egscyber.com https://cdn.slidesharecdn.com/ss_thumbnails/cybersecuritycolombomeetup-191028111745-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/cyber-security-colombo-meetup/187719388 Cyber security colombo... https://cdn.slidesharecdn.com/ss_thumbnails/big4wsofbigthreathunting-190619050249-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/big-4-ws-of-big-threat-hunting/150536411 Big 4 W&#39;s of Big Threa... https://cdn.slidesharecdn.com/ss_thumbnails/shihan-190404053955-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/econ-what-and-why/139500073 eCon - What and Why?