Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Streamline Supply Chain Operations with Business Intelligence Gowri Selka, Volantsys Analytics | Allison C. Ullrich, Outer | Dave Mendenall, Cradlepoint "Ongoing supply chain and logistic disruptions plagued 2021, with Statistica’s ‘Share of supply chain disruptions worldwide by region 2021’ reporting ... August 17, 2022 4:00pm How Blockchain is Driving Transparency Across the Supply Chain Jolanda Kooi - tex.tracer Bart Westerman - tex.tracer Gunjan Bassi - IDC Frederik De Breuck - Fujitsu According to an IDC survey, 61% of the European manufacturers increased their spending on technology associated with sustainability programs in 2021. ... 4 days ago | 45 mins Thinking Beyond Ransomware – It’s Not All About the Bitcoin John Checco, Resident CISO, Proofpoint; Martin Raymond Okumu, CIO CCSF -SFSD-SO; Alex Holden, CISO; Brandon Dunlap, Moderator Ransomware attacks not only hit companies financially, but can impact their data, access and operations. And it has a ripple effect as we’ve seen disr... 5 days ago | 57 mins Why conversational support is now a Must-Have Jasmine Jaume, Intercom | Ryan Steinberg, Intercom | Kate Leggett, Forrester Forrester Consulting recently surveyed global support leaders to see how customer support is changing. They found that personalized, messenger-based s... August 23, 2022 9:00am 2021 OWASP Top 10: Broken Access Control - Ep 1 John Wagnon, Solutions Architect, F5 2021 OWASP Top 10: Broken Access Control - 01 94% of tested apps showed some form of broken access control. Failures can result in unauthorized disc... September 14, 2022 9:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... 1 month ago | 11 mins 2021 OWASP Top 10: Cryptographic Failures - Ep 2 John Wagnon, Solutions Architect, F5 2021 OWASP Top 10: Cryptographic Failures - 02 Cryptographic failures, previously known as "Sensitive Data Exposure", lead to sensitive data exposur... September 21, 2022 9:00am 2021 OWASP Top 10: Injection - Ep 3 John Wagnon, Solutions Architect, F5 Injection is a broad class of attack vectors where untrusted input alters app program execution. This can lead to data theft, loss of data integrity, ... September 28, 2022 9:00am Live Talk: Building a safer future in Healthcare Kieran Cook Even as the global threat from COVID-19 has evolved into the ‘new normal’, another pandemic has shown no signs of abating, with a rate and severity of... 1 hour ago | 29 mins Enboarder EDGE Episode 3: Activating Your People Adam Smiley Poswolsky. Annee Bayeux, Degreed. Brogan Brown, TomTom. Bobby Melloy Ph.D, Culture Amp. Stephanie Ley, Domain. We are going to show you how to actually start activating your people. Like right now. The best thing about it is, it’s a philosophy so all you have ... August 17, 2022 10:00am Load more