top of page

OUR SPEAKERS

speaker_badge_banner_red.png
Share on:
Asset 14icon.png
Asset 39icon.png
Asset 12icon.png

Cybersecurity researcher/engineer with 6+ years of experience with IDF and corporate companies. An incident response expert, currently focused on cloud security. Educated by Mamram Cyber Defense Course (2015). Currently I am acting as contractor for Accenture Security (MAGLAN) in the Cloud & DevOps security field (my projects are for Fortune 500 companies).
Hackeriot community leader | Leading cyber lady | She Codes; mentor | Step-In R&D Member & Mentor | Zikaron Basalon volunteer
Advocate for helping women getting in the HiTech ecosystem and specially to the cybersecurity world.

Eden Katz

Cybersecurity Researcher
Asset 12icon.png
Asset 1TWITTER.png
Asset 39icon.png
Asset 17icon.png
linkedin.png
twitter.png
facebook.png
github.png
English, Hebrew
Languages:
Asset 7TWITTER.png
Location:
Tel Aviv, Israel
Asset 7TWITTER.png
Can also give an online talk/webinar
Paid only. Contact speaker for pricing!

MY TALKS

From Coding to Cybersecurity: A Teenage Girl's Journey

Inspirational, Women in Tech, Security / Privacy, General, Community / Networking, Diversity and Inclusion, Data / AI / ML, Soft Skills

Asset 12SLIDES.png
Asset 21talk.png
Asset 11SLIDES.png

I am storytelling about my path - from young girl with big love to computers, to teenager with computer science major in high-school that doesn't want to write another code in her life, to technology service in the C4I (MAMARM/BASMACH/ALPHA) to Israeli Navy and then in the civilian technology market as security researcher and computer science (B.Sc.) student.

Asset 1icon.png

Uncovering the Secrets of Cloud Security

Innovation, Security / Privacy, Women in Tech, Data / AI / ML, Diversity and Inclusion, Community / Networking

Asset 12SLIDES.png
Asset 21talk.png
Asset 11SLIDES.png

Cloud security refers to the measures and protocols put in place to protect data and information stored in the cloud from unauthorized access, use, disclosure, disruption, modification, or destruction. The use of cloud services has become increasingly popular as more and more businesses move their operations and data to the cloud. As a result, the importance of cloud security has grown significantly. In this talk, we will explore the various concepts of cloud security including data encryption, access controls, and security governance, as well as the challenges and best practices for securing data in the cloud. We will also discuss the role of security in the cloud, including compliance, risk management, and incident response.

I DID THIS ABSTRACT AND SLIDES USING AI

Asset 1icon.png

Leveling Up Your Cybersecurity Knowledge: A Talk for Gamers

General, Security / Privacy, Women in Tech, Innovation, Soft Skills

Asset 12SLIDES.png
Asset 21talk.png
Asset 11SLIDES.png

As technology continues to advance, the use of computer games has become increasingly popular among young people. However, the rise in technology also brings with it a rise in cybersecurity threats. In this talk, we will explore the intersection of computer games and cybersecurity. We will discuss the importance of understanding the basics of cybersecurity throughout "cheats" in computer games. We will also cover some common cybersecurity threats that young people may encounter, such as phishing, malware, and social engineering. Additionally, we will provide tips and best practices for staying safe online while playing computer games. Overall, this talk aims to empower high school students to navigate the digital world with a better understanding of the cybersecurity risks, so they can enjoy their games safely.

Asset 1icon.png

From Coding to Cybersecurity: A Teenage Girl's Journey

Completed

true

Visible

true

Order

5

Go to lecture page

Uncovering the Secrets of Cloud Security

Completed

true

Visible

true

Order

5

Go to lecture page

Leveling Up Your Cybersecurity Knowledge: A Talk for Gamers

Completed

true

Visible

true

Order

5

Go to lecture page

bottom of page