Limited Time Deal on 'The Ultimate Kali Linux Book, 3E'

Glen D. Singh
Home
About
  • whoami
  • Interviews
  • Accolades
Blog
Books
Study
Articles
Talks
Courses
Contact
Disclaimer
Glen D. Singh
Home
About
  • whoami
  • Interviews
  • Accolades
Blog
Books
Study
Articles
Talks
Courses
Contact
Disclaimer
More
  • Home
  • About
    • whoami
    • Interviews
    • Accolades
  • Blog
  • Books
  • Study
  • Articles
  • Talks
  • Courses
  • Contact
  • Disclaimer
  • Home
  • About
    • whoami
    • Interviews
    • Accolades
  • Blog
  • Books
  • Study
  • Articles
  • Talks
  • Courses
  • Contact
  • Disclaimer

Cybersecurity Talks by Glen D. Singh

AI Red and Blue Teaming Summit with live labs on AI threats.

AI Red and Blue Teaming Summit 2026: Reconnaissance for Ethical Hackers Using AI

AI Red and Blue Teaming Summit 2026: Reconnaissance for Ethical Hackers Using AI

AI Red and Blue Teaming Summit 2026: Reconnaissance for Ethical Hackers Using AI

Explores how the next generation of ethical hackers are leveraging AI to improve their workflow and analysis of security vulnerabilities within organizations.

Read More
Diagram showing risk management options: reduce, avoid, transfer, accept.

Managing Cyber Risk Across Third Parties and Service Providers | AMCHAM T&T 2025

AI Red and Blue Teaming Summit 2026: Reconnaissance for Ethical Hackers Using AI

AI Red and Blue Teaming Summit 2026: Reconnaissance for Ethical Hackers Using AI

As supply chains grow more complex and digitally interconnected, third-party cyber risk has become one of the most critical vulnerabilities in modern enterprise security.

Read More
Logo for Packt's Global Cybersecurity Conference 2024 on black background.

Global Cybersecurity Conference 2024: Strategic insights & tactical Playbooks

AI Red and Blue Teaming Summit 2026: Reconnaissance for Ethical Hackers Using AI

Global Cybersecurity Conference 2024: Strategic insights & tactical Playbooks

Dive into the cutting-edge of cybersecurity with this exclusive video bundle from the Global Cybersecurity Conference 2024. This comprehensive video bundle features in-depth talks and workshops led by world-renowned experts, designed to enhance your understanding and response to emerging cyber threats

Learn more
Visual promoting cyber threat protection by Glen D. Singh for TechTarget.

Protecting organization data against cyber attacks, threats and data breaches

Protecting organization data against cyber attacks, threats and data breaches

Global Cybersecurity Conference 2024: Strategic insights & tactical Playbooks

Discover  the need for data protection and how threat actors locate sensitive  information about their targets that can lead to compromising a company  and stealing data. 

Learn more
Keyboard key with a lock symbol representing security or privacy.

Role of Network Security in Today’s World

Protecting organization data against cyber attacks, threats and data breaches

Role of Network Security in Today’s World

Network security plays a vital role in today’s  world. Without it, threat actors such as cyber criminals will gain the  advantage over their targets. Organizations are beginning to realize the  need to invest in cybersecurity and network security solutions to  safeguard themselves. 

Learn more
Man in office relaxing with hands behind head, looking at computer.

Cybersecurity and Ethical Hacking webinar

Protecting organization data against cyber attacks, threats and data breaches

Role of Network Security in Today’s World

Cybersecurity  and Ethical Hacking webinar which introduces viewers to  the field of  cybersecurity, while providing insights on how to break in to the  industry. 

Learn more

Copyright © 2026 Glen D. Singh - All Rights Reserved.

Security at Heart, Network at Mind.

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close