Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Are we there yet? The status of the profit, buyback, and valuation cycles Philip Lawlor, Managing Director, Market Research at Wilshire Join Philip Lawlor, Managing Director, Market Research at Wilshire for a 30-minute webinar that examines key market navigation drivers and discussion ... 2 days ago | 11 mins Getting Sand in Funny Places: Understanding Malware Sandboxing Michael Bourton, Sr. Sec Solutions Engineer, VMRay; Catherine Chapman, Moderator Over the past decade, sandboxes have become the standard tool for the analysis of previously unseen malware. They are embedded in security controls su... 3 weeks ago | 61 mins API Security 101: Best Practices for Securing APIs Elad Shuster, Prd Mngr; Geoff Sindel, Web App &API Sec Architect, Prisma Cloud/Palo Alto; Brandon Dunlap, Moderator API security has been gaining a lot of attention in recent years due to the move of modern applications to cloud-native environments and microservice-... 1 month ago | 59 mins DevSecOps Tech Talks Session 2: Accelerate Your Path to Secure Production Timo Salm, Senior Lead Solution Engineer VMware Tanzu Attacks on software supply chains have become prolific in the past few years. Organisations are often forced to trade-off between speed and safety, pu... 3 weeks ago | 75 mins Don’t Let an Online Scam Steal Your Holiday Spirit Gretel Egan, Sr. Security Strategist;Natasha Clymer, Sec Analyst;Darren Mott, Sr. Dir for Edu;Brandon Dunlap, Moderator The hustle and bustle of the holiday season and end of year activities create human distractions that cloud our judgement and keep all of us from maki... 5 months ago | 59 mins The Art of the (Im)possible: Overcoming Business Email Compromise Stephen Doughtery, Financial Fraud Investigator, U.S. Secret Service and Crane Hassold, Dir of Threat Intel, Abnormal Sec. The 2013 Internet Crime Complaint Report released by the FBI didn’t even mention business email compromise. A year later it was the second most financ... 3 months ago | 33 mins What You Need to Know About Securing Developer Environments Before It’s Too Late James Robinson Deputy CISO/Dir Netskope;Liav Caspi CTO Legit Sec;Alex Babar Product Marktg Dir Legit Sec; Dunlap, Moderator The pace of new software releases has grown rapidly since the shift to DevOps, which in turn has created a dynamic attack surface in need of immediate... 5 months ago | 60 mins Deep Observability and 2 Ways It Transforms Cloud, Network and Security Bassam Khan, VP of Product and Technical Mktg - Gigamon + Stephen Goudreault, Sr. Technical Mktg Mgr., Cloud - Gigamon Based on closed-door discussions with over 100 IT executives, Gigamon has created a vision for the future of security and monitoring in the hybrid clo... 4 months ago | 41 mins Deep Observability - 2 Ways It Transforms Cloud, Network and Security Operations Bassam Khan, VP of Product and Technical Mktg - Gigamon + Stephen Goudreault, Sr. Technical Mktg Mgr., Cloud - Gigamon Based on closed-door discussions with over 100 IT executives, Gigamon has created a vision for the future of security and monitoring in the hybrid clo... 5 months ago | 41 mins BlueVoyant #2- Continuous Monitoring for Third-Party Risk: A Customer Journey Mark Tilston, Client Success Mngr, BlueVoyant; Richard Furze, Cyber Sec Manager, Lloyds Banking Group; B. Dunlap, Moderator Organizations across all sectors have long relied on risk ratings or in-house risk management programs to keep track of the security posture across th... 11 months ago | 58 mins Load more