HomeWebinar
Grow by sharing knowledge
We want to add value by providing a convenient platform for experts to share their knowledge, allowing participants to access valuable insights and information remotely.

Bug Bounty in Cybersecurity | BugBounter Webinar (Turkish)
Elif Esin ETİK USLU from Edenred Türkiye and Ömer GÖKTAŞ from Lostar Bilgi Güvenliği met the IEEE members to talk about bug bounty in cybersecurity at this special event hosted by BugBounter.
Previous Webinars

Bug Bounty in Cybersecurity | BugBounter Webinar (Turkish)
Elif Esin ETİK USLU from Edenred Türkiye and Ömer GÖKTAŞ from Lostar Bilgi Güvenliği met the IEEE members to talk about bug bounty in cybersecurity at this special event hosted by BugBounter.

2022 Threat Landscape & Cyber Security at the World Cup 2022 | BugBounter Cyber Security Webinar #7
BugBounter Webinar Series' 7th episode focuses on the Microsoft Digital Defense Report, threat landscape of 2022, key insights into good cyber security practices, and cyber security at World Cup 2022 in Qatar.

BugBounter Webinar Series | "Women in Cybersecurity"
The focus of this BugBounter webinar was women's impact, and the gender-related remarks about the cybersecurity industry. Organization of this event was quite special for us. The BugBounter Team supports women empowerment in each and every industry. 🦸♀️🚀💜

Secure The Future: The Future of Cybersecurity Testing in South Africa
The digitalization of business practices, processes, or basically, the entire world has created a suitable environment for cyber threats to grow. After being seized through a cyber attack, sensitive information or financial resources are used by cyber attackers as leverage against institutions to increase the amount of demanded ransom. Guest Speaker: Michiel Jonker, Futura International, South Africa.

Cyber Secure Estonia: Reducing the Risk of Cyber-Attacks
The digitalization of business practices, processes, or basically, the entire world has created a suitable environment for cyber threats to grow. After being seized through a cyber attack, sensitive information or financial resources are used by cyber attackers as leverage against institutions to increase the amount of demanded ransom. Guest Speaker: Omkar Joshi, CyberArch, Estonia.
