Ethical Hacking Webinar
Thank You to Everyone Who Attended the Webinar
Cracking the Code: Ethical Hacking as Part of Your Cybersecurity Strategy
In our webinar, learn from our very own Pen Tester, Raphael Ebba, and Security Consulting and Assessment Team Lead, Jonathan Wolff about the significance of Ethical Hacking and Penetration Testing for your business. They will discuss the fundamentals of Penetration testing, share experiences from real-world scenarios, and share the top five risk mitigation strategies to protect your business against cyber threats.
- Understanding Penetration Testing
- Real-World Scenarios and Case Studies
- Top 5 Risk Mitigation Strategies
Watch The Webinar Recording
Jonathan Wolff
Security Consulting and Assessment Team Lead
Jonathan has over 15 years of experience in the Cybersecurity and IT industry with extensive experience in Security Assessments, Corporate Compliance, and Information Technology. As a naval veteran, he brings a disciplined and strategic approach to his work. His primary goal with Convergence is to help organizations build and manage solutions to achieve compliance with a variety of frameworks that ensure business alignment on a global scale.
He specializes in Corporate Governance, Risk, and Compliance Management, Cyber Security Program Development and Assessments, Information Technology and Cyber Security Consulting, Information Security Assessment and Remediation, and Business Systems and Program Management.
Raphael Ebba
Offensive Security Engineer / Penetration Tester
Raphael has over 9 years of experience in systems, networks, and security engineering. He ensures our clients’ digital security through diverse testing techniques making sure that our clients not only think they are secure but know they are secure.
Who Should Attend
- IT Managers and Security Professionals
- Business Owners, CEOs, CFOs, and all company stakeholders
- Anyone interested in enhancing their cybersecurity knowledge
Why Attend
- Learn the importance of Penetration Testing in Cybersecurity
- Learn from real-life scenarios and case studies
- Learn the Top 5 Cybersecurity Risk Mitigation Strategies