Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Automagic API Security Testing Steve Chappell, SW Manager & API Security Evangelist Most API Security tools/platforms are built for the Security teams that are told “here’s an API service already running – go secure it”. Thus, they ta... 1 month ago | 30 mins Cyber Myth Busting: Blasting Common Misconceptions Diana Kelley, Cybrize and Guests No one is a stranger to the complexity of cyber. And with confusion, comes misconception. In this special episode of The (Security) Balancing Act, Di... June 14, 2023 4:00pm Zero to SIEM in Seconds Sanjay Raja, VP Product Marketing and Solutions | Antony Farrow, Sr Director of Solution Architecture Improving threat detection, investigation and response within your SOC requires the ability to optimize, accelerate and improve the accuracy across fo... 2 days ago | 57 mins A Demo of Vulnerability Risk Management Data Aggregation and De-duplication Tony Taylor, Vulcan Cyber solutions architect | Mike Parkin, Vulcan Cyber engineer Sherlock Holmes said, "It is a capital mistake to theorize before one has data." Enterprise vulnerability management teams know exactly what Sherlock ... 2 days ago | 31 mins Creating threat analytics on the endpoint John Bambenek, President | Bambenek Consulting Security teams are at now loss for telemetry from their devices -- the struggle is to make sense of it all. Many breaches occur not because detection ... April 4, 2023 9:00pm Watch Us Lose Data: Power Platform Edition John Hodges (Vice President of Product Strategy, AvePoint) & Conor Dean (Partner Success Manager, AvePoint) It’s every business’s worst fear: data loss. And we’re doing it on purpose. Microsoft Power Platform is revolutionizing how we get work done. Its ins... 2 days ago | 56 mins Making cyber-threat intelligence programs effective and impactful Jon Oltsik- Distinguished Analyst & Fellow with Enterprise Strategy Group & TJ Alldridge- Product Marketing Manager, Mandiant Most organizations have cyber-threat intelligence programs in one form or another, but the tough-to-face fact is that many only achieve tactical succe... 2 days ago | 32 mins Advanced persistent threat predictions for 2023 David Emm: Principal Security Researcher, Pierre Delcher: Senior Security Researcher Global Research and Analysis Team The political turmoil of 2022 brought about a shift that will resonate in cybersecurity for years to come and have a direct impact on the development ... 4 days ago | 49 mins Centralize Data Security Governance with Dremio & Privacera Brett Roberts, Principal Solution Architect, Dremio, Lovelesh Chawla, Director of Sales Engineering, Privacera With the explosive growth in data volumes, data access requests, and interest in data democratization, data security and governance has become more im... April 4, 2023 3:00pm Understanding Bots: Protecting your Customer Experience… and Bottom Line Susan McReynolds, Akamai | Christine Ross, Akamai | Tony Lauro, Akamai | David Senecal, Akamai Maintaining and deepening customer trust is imperative, especially in a post-pandemic world where brand loyalty is up for grabs. With the unprecedente... 2 days ago | 42 mins Load more