Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The Future of Collaborative Science...Code Ocean Frank Zappulla, Head of Scientific Computing; Alicia Liu, PM; & John Carter, Enterprise Account Manager at Code Ocean Code Ocean is uniquely positioned as a one stop platform to manage all of your Collaborative Science. Bringing together decision-makers, research IT... June 22, 2023 6:00pm Data Protection and Compliance Essentials for Cyber Resilience (Episode 3) Alyssa Johnson, Account Development Manager & Robert Crozier, Lead Solutions Consultant Discover the solutions that are crucial to protecting your organization's data and will ensure compliance with legal requirements in any industry. Clo... June 22, 2023 7:30pm Streamline Investigations with Remote Collection of Androids and Workplace Apps Emmy Gamble, Technical Customer Success Manager, Cellebrite Enterprise Solution Secure remote collection and analysis of endpoint data is critical in today’s hybrid working environment. With employees generating more data than eve... 3 weeks ago | 41 mins Protecting Sensitive Data at Scale with Imperva and Fortanix Terry Ray, SVP, Data Security GTM & Field CTO, Imperva | Dr Richard Searle, VP Confidential Computing , Fortanix In today’s fast-moving world where everything is connected, a company’s data has become a highly precious commodity that is critically important to en... June 22, 2023 3:00pm IDC Spotlight: Effective Multicloud Data Security Requires a Unified Approach Jennifer Glenn, IDC Research Director, Information & Data Security Products, Terry Ray, Imperva SVP Data Security GTM In a recent IDC study, 87% of organizations identified their businesses as well on their way to becoming digital first. Inevitably, there will be a su... 4 weeks ago | 61 mins Account Takeover in Azure's API Management Developer Portal Thomas Stacey API Management is a critical component of modern application development. As organizations increasingly rely on APIs to exchange data between systems,... 2 months ago | 34 mins IDC Spotlight: Effective Multicloud Data Security Requires a Unified Approach Jennifer Glenn, IDC Research Director, Information & Data Security Products, Terry Ray, Imperva SVP Data Security GTM In a recent IDC study, 87% of organizations identified their businesses as well on their way to becoming digital first. Inevitably, there will be a su... 2 months ago | 61 mins PAM 2.0: Smarter, Better, Faster, Stronger Martin Cannard, VP of Product Strategy at Netwrix, Dirk Schrader, VP of Security Research and Field CISO EMEA at Netwrix Theft of privileged credentials is the costliest type of insider threat, and the number of such thefts has tripled over the last two years. Privileged... 7 months ago | 56 mins Why Your E-Discovery Document Review Strategy is Likely Broken Jenny Hamilton, Esq., General Counsel, Exterro, Linda Luperchio, Director of E-Discovery and IG, Hanover Insurance Group Document review is the most expensive stage within the discovery process and it's vital for cost-conscious legal teams to periodically re-evaluate the... 1 year ago | 55 mins 2022 Tech Trends in Litigation Antonio Avant, Troutman Pepper eMerge; John Hogan, DLA Piper; Liz Roegner, Relativity & Gyorgy Pados, White & Case Organizations produce an overwhelming amount of data daily, but few tools are advanced enough to handle today’s modern data challenges. Many in the le... 1 year ago | 63 mins Load more