top of page
OUR SPEAKERS
Share on:
Cybersecurity Researcher | AI Specialist | Advocate for Women in Tech
Sugandh Seth is an accomplished cybersecurity researcher and artificial intelligence specialist with over 14 years of experience in cutting-edge research, IT training, and academic leadership. Currently serving as a Research Associate at the University of Manchester, Sugandh’s expertise spans Intrusion Detection, Machine Learning, and Python Programming.
A passionate advocate for women in technology, Sugandh combines her technical acumen with a commitment to empowering future leaders through mentorship and education. She has delivered impactful seminars on cybersecurity, including for prestigious organizations such as the Indian Airforce. Recognized for her excellence, Sugandh is a Gold and Silver medalist in her Bachelor and Master of Computer Applications, respectively, and holds a Ph.D. in Cybersecurity from Guru Nanak Dev University.
Sugandh’s speaking engagements focus on demystifying cybersecurity, fostering inclusion in tech, and leveraging AI for societal impact. Her talks motivate action, drive innovation, and highlight the transformative impact of AI and cybersecurity in shaping the future of technology.
sugandh
Researcher
English
Languages:
Location:
manchester, United Kingdom
Can also give an online talk/webinar
Paid only. Contact speaker for pricing!
MY TALKS
Cybersecurity in Everyday Life: Protecting Yourself in a Digital World
General
Objective:
This session aims to provide essential insights into the most common and emerging cyber threats, including hacking techniques, social engineering attacks, and how to protect personal, organizational, and professional digital spaces. Participants will gain practical knowledge on safeguarding against these threats and how to become proactive in ensuring digital safety.
The talk will cover
1. Introduction to Hacking and Phases of Hacking
2. Modern Cyber Landscape
• Google Hacking:
• WhatsApp and Social Media Attacks etc
3. Social Engineering Attacks
4. Phishing Techniques in Detail
5. Best Practices for Personal Security
6. Protecting Your Devices and Data
7. Ensuring Workplace Security
8. Becoming Proactive in Cybersecurity
Conclusion & Recommendations
This session will conclude by providing actionable recommendations for participants to implement immediately, such as setting up multi-factor authentication, using secure passwords, and staying vigilant against social engineering attempts. Attendees will leave with a clearer understanding of how to protect themselves and their organizations from both common and advanced cyber threats
Cybersecurity in Everyday Life: Protecting Yourself in a Digital World
Completed
true
Visible
false
Order
100
bottom of page