Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 2 weeks ago | 21 mins European IT Priorities: What's in Store for 2023? Bryan Glick, Editor-in-Chief (Computer Weekly) and Brent Boswell, SVP, International (TechTarget) With the current economic situation and budget cuts across the IT sector, go-to-market (GTM) teams need to be laser-focused on delivering value to the... 2 weeks ago | 49 mins Destroying the Barrier to Sophisticated Detection and Response Dan Brett, Chief Product Officer and Richard Barrell, Head of Product Management Your security infrastructure is under attack. And your SOC team is drowning in alerts from the entire security stack. Something is broken—and that’s w... May 4, 2023 2:00pm [Attack]tive Directory: How To Overcome Exploits and Prevent Attacks Jeff Forsyth, PreSales Engineer at STEALTHbits Technologies, and Sander Berkouwer, CTO at DirTeam and 14-time Microsoft MVP Active Directory controls access to critical systems and data for organizations around the world — but it is not always managed securely. That makes i... 2 days ago | 65 mins What Threat Actors Don’t Want You to Know: Active Evasion Techniques Michael Tyler Cybercriminals constantly evolve their tactics to evade detection. This is especially true for phishing campaigns. Threat actors frequently use new te... 5 days ago | 28 mins How To Overcome Active Directory Exploits And Prevent Attacks Shira Bendkowski Director of Product Management at XM Cyber According to Gartner, “It is critical to make concentrated efforts to comprehensively secure and monitor Active Directory, proactively look for threat... 3 weeks ago | 44 mins ESG investing in China: a new paradigm? Sir William Russell, Ma Jun, Lily Dai, Arne Staal, Richard Sheng, David Smith ESG in China is critical to achieving sustainability goals, in particular on climate change and the environment. As the second largest economy globall... 3 days ago | 67 mins From Hiring to Retention: Enabling a Strong Internal Mobility Strategy Caleb Baker - President and Abigail Scott - Managing Director APAC at Sova Assessment Professionals involved in talent acquisition and development are under constant pressure to achieve key objectives, including: • Lowering the total ... 3 days ago | 29 mins Smartly Using Global Threat Intelligence in the Fight Against DDoS Attacks Richard Hummel, Senior Engineering Manager, Security, NETSCOUT Andrew Cockburn, Chief Solutions Architect, Security, NETSCOUT Join this discussion and gain insight on: • The different types of Cyber Threat Intelligence (CTI) and the value they provide to supporting and enhanc... April 5, 2023 5:00pm Active Data Management Solutions for Research Steven Lazer (Dell Technologies) This short video is part of the Dell Technologies thought leadership series on life sciences technology where we get a chance to learn from their subj... 2 weeks ago | 8 mins Load more