Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Perform Effective Web Application Security Assessments Leanne Shapton - Portswigger, Joel Noguera - Hacker & Pentester, Cindy Ho - HackerOne Security reviews and assessments can take a lot of effort and still not provide the results you are looking for, especially in the face of ever-expand... August 23, 2022 4:00pm Overcoming Machine Learning Development Challenges Gideon Mendels, CEO and co-founder of Comet An independent survey has uncovered yet another hurdle to delivering value with AI. Challenges related to people, process, and tools are creating fric... 4 days ago | 60 mins How to Stop Ransomware Attacks David Muniz - Cybersecurity specialist The future of cybersecurity brings with it many changes, some of which we can predict today. Companies tend to be unprepared for the fastest-spreading... July 5, 2022 4:00pm The increasing impact of the 2021 VAT tax legislation Peter Boerhof - Vertex Inc, Jane Curran -Deloitte LLP, John McCarthy - Taxamo, Yuliya Logunova - Rakuten The ever-changing tax landscape is making it very hard for e-commerce marketplace businesses to properly adhere to tax legislation and regulation. Re... 2 weeks ago | 64 mins Legal InfoSec: Guarding Your Data in the Cloud Dean Sapp, VP of Information Security @ Filevine and Thomas Kline Director of Information Technology @ Stark & Stark Join Filevine's VP of Information Security, Dean Sapp, and Thomas Kline, Director of Information Technology at Stark & Stark as they discuss the secur... 2 weeks ago | 58 mins Minerva Briefing - 2021 Australia AGM Season Review Alex Whitebrook As investors and companies alike reflect on the 2021 Australian AGM season, this Minerva briefing looks at the voting trends and governance developmen... 2 months ago | 13 mins By the Numbers: Open Source Risk in M&A Phil Odence, Synopsys Open source is widely used in software development because it allows you to create high-quality software quickly. But if left unmanaged, open source c... July 27, 2022 4:00pm Impressions Matter. Security Non-Negotiable Johan Fantenberg (Principal Solution Architect) The latest review conducted by HKCERT of the Hong Kong Productivity Council found that phishing was the most common method used by attackers to obtain... July 12, 2022 3:00am AI Impact on Cardiac MR: Disease Classification and Stratification Dr. Bradley Allen, MD, MS In this presentation from RSNA 2021 Dr. Allen reviews how AI impacts his daily Cardiac MRI workflows. The implementation of AI tools is able to save h... 3 weeks ago | 16 mins Threat Intelligence Today: Securing Endpoints Against Malware Adam Kujawa, Security Evangelist & Director of Malwarebytes Labs, Malwarebytes Malwarebytes' 2022 Threat Review reported 77% more malicious software detected in 2021 than in 2020. Cyberattacks are vicious, causing millions of dol... July 19, 2022 7:00pm Load more