Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner

Join us for a YCSC QnA Dialogue

According to the Cybersecurity Global Status Survey 2015, conducted by ISACA, 92% respondents believe that cyberattacks are among the three biggest threats facing organizations today. It is also a known fact that, due to the risk of reputation damage, most organizations and cyber security professionals avoid collaboration to tackle cyber attacks.

The reasons behind this lack of collaboration and communication are understandable. The current efforts to foster such collaboration offer no aid to people, who might not be cyber security experts (such as CEO’s, IT managers of SMEs and startups), but are plagued by cyber attacks within their network. With a view to bridge this communication gap, we invite cyber security professionals, veterans, experts and alike to have a dialogue with us in form YCSC QnA.

What is YCSC QnA?

YCSC QnA is a communication platform for people, working in the field of cyber security. Through it they can share their story, learnings, opinions, tips and experiences with our readers. Participating in a YCSC QnA dialogue also enhances their visibility to the cyber security industry at large. It enables other professionals to reach out to them whenever their expertise is required.

A typical YCSC QnA is a text based dialogue. It will comprise of six questions which would be framed based on the participant’s profile. Here’s our latest dialogue.

How to participate?

We extend a warm invitation to you to join us for a YCSC QnA dialogue. Share your story, experiences and opinions with our vast pool of readers. To accept the invitation, please fill the form below. Alternatively, invite a contact by filling the form with their details. Please mention your name and email ID in the Referrer fields.

    Optin Form

    Search

    Follow us on Twitter

    My Tweets

    Categories

    Tags

    Active directory Active directory lab adsecurity adsi adsisearcher Android attack active directory awareness blue whale challenge Certification CISSP crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden ellitedevs forest enumeration hacker Information Security ISACA Kali Linux lab environment lab hardware Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest powersploit Powerview privacy red team Risk Management Social Media user enumeration Wifi Windows

    Top Posts

    • Active Directory User Enumeration using PowerView
      Active Directory User Enumeration using PowerView
    • Social-Engineer Toolkit: An Introduction
      Social-Engineer Toolkit: An Introduction
    • Mona.py for exploit devs: 6 must know commands
      Mona.py for exploit devs: 6 must know commands
    • Active Directory Network Recon using PowerView
      Active Directory Network Recon using PowerView
    • ADSISearcher (Part 2)
      ADSISearcher (Part 2)
    • Introduction to MITRE ATT&CK Framework
      Introduction to MITRE ATT&CK Framework

    © Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress