Committed to connecting the world
Advanced Search
ITU
General Secretariat
Radiocommunication
Standardization
Development
About ITU-D
Events
Projects
Publications
TDAG
WTDC
Study Groups
Regional Presence
Partnerships
Join ITU-D
News
Members' Zone
Join ITU
Women in Cyber: Expert Training Course with Irena Damsky
Rollup Image
You are here
ITU
>
Home
>
ITU-D
>
ITU-D Cybersecurity
Share
Cybersecurity Programme
Mandate
Global Cybersecurity Index
National CIRT
CyberDrills
National Strategies
Cyber Skills Development
Child Online Protection
Cyber for Good
Global Partnership
Publications
Events
Page Content 20
DESCRIPTION OF THE SESSION
In the context of the Women in Cyber Mentorship Programme, ITU, FIRST and EQUALS have the pleasure to present our second Training, as part of the TRAIN series of the programme.
Through an interactive and immersive presentation, Irena Damsky was be adding on to our list of impactful trainings. With a strong background in threat intelligence, cybersecurity and entrepreneurship, she offered our participants particularly useful leadership and management tools, largely sought after in the cybersecurity field and beyond.
TRAINING COURSE: INTRODUCTION TO THREAT INTELLIGENCE
Wednesday May 26
th
2021
14:00--17:00 Geneva time
Invitation letter
Live
Archive
Registration
:
Training Courses
Remote participation Registered users only
AGENDA
Time
Activity
Speaker
14:00 – 14:05
Welcome and Introduction
Moderator: Yasmine Idrissi Azzouzi
14:05 – 14:45
Training with Activities
Trainer: Irena Damsky
14:45 – 17:00
Open Q&A session with the audience
Moderator & Irena Damsky
SPEAKER INFORMATION
Irena Damsky is a Director of Research for Cortex XDR at Palo Alto Networks and Founder and CEO of Damsky.Tech LTD a Threat Intelligence research, training and consulting company. She previously established the threat intelligence group for Check Point Software and served over six years in the Israeli Intelligence Forces. She holds a BSc and MSc in Computer Science and is fluent in English, Russian, and Hebrew. Irena is a well-recognized security expert, speaker, and entrepreneur focusing on networking, malware, and data analysis.
Page Content 9
Page Content 10
Page Content 18
Page Content 19
Page Content 6
Page Content 7
Page Content 11
Page Content 12
Page Content 2
Page Content 3
Page Content 4
Page Content 5
Page Content 13
Page Content 14
Page Content 15
Page Content 16
Follow us
Twitter
Facebook
YouTube
Flickr
Linkedin
Instagram
Soundcloud
Podcasts
Spotify
Spreaker
TikTok