Free Seminars

Keep an eye here, or register to be informed of OUR FREE events ...

Read more

Documentation

Step by Step guide’s or How to documentations can be found here...

Read more

Our Sponsors

Better Together User Group,info & sponsors

Read more

About Erdal Ozkaya

Who is Erdal Ozkaya?
To learn more about him, click here...

Read more

Video Tutorial

Watch and learn the easy way...

Read more


I am pleased to be part of E- Crime Congress in Germany (Frankfurt) this week ( 28 January 2015) which is Germany's largest meeting "congress" of senior information risk and security professionals. Now in its sixth successful edition, it aims to provide its audience of over 150 senior information security professionals with practical guidance, tactical insights, and strategic real life case studies through a mix of expert talks and technical breakout sessions.

Increasing in size year-on-year with its sold-out delegations, the event is uniquely designed for those responsible for safeguarding digital assets, aligning security and risk strategy, and protecting sensitive data. It provides a number of opportunities for all there to network, allowing delegates to exchange insights and discuss the latest industry developments in an invitation-only environment.


 

 Education Seminar - Session 1  10.20-11.00 AM
Secunia- Of course you’ve got your security under control. Right?


Erdal Ozkaya, IT Security specialist, Secunia

We all think that we are “secure”. We trust our vendors, hardware and policies. So how come every single week, the media are full of new spectacular stories about high-profile enterprises getting hacked?  Your take-away from those stories should be that if there is a weakness in your IT security system, it’s better that you find it before someone else does! Security breaches come in all shapes and degrees of severity, and even a minor flaw in your infrastructure can leave your business in poor condition.  It’s important to understand that in the end, information security is not an IT department's problem - it is a business issue! 

In this session you will learn:

  • How to find the weak points in your security before someone else does
  • Why information security is a business issue and not an IT department’s problem
  • How security leaks can be stopped before too much damage is done

 Education Seminar - Session 3  15:30 -16:10

Erdal Ozkaya, IT Security specialist, Secunia

We all think that we are “secure”. We trust our vendors, hardware and policies. So how come every single week, the media are full of new spectacular stories about high-profile enterprises getting hacked?  Your take-away from those stories should be that if there is a weakness in your IT security system, it’s better that you find it before someone else does! Security breaches come in all shapes and degrees of severity, and even a minor flaw in your infrastructure can leave your business in poor condition.  It’s important to understand that in the end, information security is not an IT department's problem - it is a business issue! 

In this session you will learn:

  • How to find the weak points in your security before someone else does
  • Why information security is a business issue and not an IT department’s problem
  • How security leaks can be stopped before too much damage is done

Info about me :

Erdal Ozkaya, IT Security specialist, Secunia

Erdal Ozkaya is an IT Security specialist with business development and management skills who focuses on Penetration Testing and IT auditing. Erdal has the following qualifications: Master of Information Systems Security (M.I.S), Bachelor of Information Technology (B.I.T.), MVP, Microsoft Certified Trainer, Microsoft Certified Leaning Consultant, ISO27001 Consultant, Certified Ethical Hacker (CEH), Certified Ethical Instructor, and Licenced Penetration Tester. He is a lecturer at Charles Sturt University and is also completing his Ph.D. in IT Security. Erdal advises Government departments, Fortune 500 companies and Information Security Professionals to help prepare them for the latest in Cyber Crime He works with complex IT security solutions, and with enforcing regulatory requirements to organizations.

Template Settings
Select color sample for all parameters
Red Green Blue Gray
Background Color
Text Color
Google Font
Body Font-size
Body Font-family
Scroll to top