Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Future of Attacker Automation & AI David Warburton, Director at F5 Labs | Brian McKenna, EMEA Regional Director, Analyst Services, ESG Automation is a growing security problem that most organisations don’t recognise as many have no way of identifying which “users” are real humans and ... June 21, 2023 1:00pm The Human and Machine Identity Problem in SaaS Environments Tim Davis, Head of Solutions Engineering, DoControl Software as a Service (SaaS) applications bring the promise of business agility and enablement. But like any technology that provides significant bene... June 8, 2023 6:00pm Improving Contextual Analysis for Protecting Organizations from Insider Threats Robert A. Davidson, Insider Threat Manager at Dominion Energy & Sanjay Raja, VP Product Marketing and Solutions at Gurucul As insider threats have started to escalate in recent years, it is even more important to build and implement a successful insider threat program. How... June 15, 2023 6:00pm Defending Against Supply Chain Attacks Corey O'Connor, Product Marketing Manager, DoControl A software supply chain attack targets the software development process, with the intent of introducing malicious code into “trusted” software package... June 21, 2023 5:00pm Develop Software Fearlessly Software Supply Chain Security in 2023 Brian Fox (Sonatype), Stephen Magill (Sonatype), Katy Hiller (Sonatype) Malicious software supply chain attacks have increased an average of 742% per year since 2019. As this trend continues, you'll need to know how to eff... 4 weeks ago | 29 mins Applying Lessons from the OWASP Automated Threats Project F5 Businesses face a growing battle against malicious bots. They can skew analytics and marketing functions, which can lead to clouded decision-making an... 1 month ago | 52 mins Stopping Spray-and-Pray Nation State Ransomware Attacks Jonathan Nguyen-Duy, Field CISO, Fortinet and Brook Chelmo, Director of Product Strategy, Endpoint Security, Fortinet Worried about the increasing frequency and complexity of ransomware attacks? You’re not alone. Join Jon Nguyen-Duy, Fortinet Field CISO, and Brook Ch... 2 months ago | 50 mins MINDHUNTER #12 Cybersecurity, Spycraft and Onions… Alexis Holmes Solutions Engineer, Public Sector & Strategic As hackers increase their ability and skills to collect and exploit our data when we are online, what can we do to stop them? Our Cybersecurity expert... 2 months ago | 41 mins PAM Parity: Replacing Your Legacy Endpoint Privilege Management Solution Quickly Jeremy Moskowitz (CTO and Founder of PolicyPak, now part of Netwrix), Martin Cannard (VP of Product Strategy at Netwrix) Is your legacy tool for endpoint privilege management EOL'ing soon? Are you looking for a cost-effective replacement that provides feature parity and ... 2 months ago | 62 mins Top Threats in Retail Environments Kedar Hiremath, Product Marketing Manager In this session we will take a closer look at real-life cyberthreats in the retail environment and discuss how you can use Cisco Umbrella to craft a s... 3 months ago | 22 mins Load more