Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date IT, Spies, and Nation States: 5 Ways to Stop Insider Threats in Government Shunta Saunders A major embarrassment, at best, and a national security threat at worst. The case of a 21-year-old Air National Guardsman charged with leaking top-sec... June 20, 2023 3:00pm Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 3 months ago | 21 mins Extend Zero Trust with Deception-based Active Defense Amir Moin, Senior Product Manager at Zscaler *This is a replay session* Over the past two years, there has been a significant increase in human-operated threat actors using stealthy tactics, soc... June 28, 2023 5:00pm ThreatSTOP Automatically Turns Threat Intelligence into Pro-Active Protection Paul Mockapetris, Chief Scientist at ThreatSTOP As a large corporation, it is important to protect your organization, your customers, and the data stored within. Watch this video to learn more from ... 4 weeks ago | 4 mins Product Demo: A Modern Approach to Learning in the Flow of Work Kyle Reichelt, Product Manager at Wistail || Toni Nigrelli-LaFleur, Product Marketing Manager at Wisetail Join Wisetail's Kyle Reichelt as he showcases the value of pairing training strategies with daily operational activities (hello learning in the flow o... 1 month ago | 35 mins Connecting the Watts: why an active approach to Green Infrastructure matters Tommy Kristoffersen chaired by Aaron Cox . 2 months ago | 26 mins A user-centric approach of smart digital identity by ETSI Noémie Simonie, TelecomParisTech Emeritus Professor - Bernard Dupré, AFUTT Chair - Jean-Yves Monfort, ETSI User Group Chair New technologies, in particular artificial intelligence (AI), and Machine Learning (ML) are essential today for profiling users, in order to cope with... 2 months ago | 60 mins FIM and System Hardening: Detect and Prevent Cyberthreats in Windows Dirk Schrader, VP of Security Research at Netwrix Whether you use your Windows as your server OS for your AD, DC, SQL or file server or as the go-to operating system for your end-users; each applicati... June 14, 2023 5:00pm Unlocking the future of digital pathology: open environment is the Key! Dr. Doug Clark, Dr. Eric Walk, Dr. Konstanty Korski and Michael Rivers If you missed the opportunity at the European Congress of Pathology 2022 Roche DP symposium, take your chance now. Learn how Digital AI algorithms in ... 1 week ago | 87 mins 5G hyperautomation Red Hat: Rob Wilmoth - Chief Architect, Telco Media and Entertainment and panelists from Telefónica, Cisco and MYCOM OSI Hyperautomation is an active and strategic technology trend, expanding on the tradition definition of automation. Join us as we discuss how to apply a... 3 weeks ago | 43 mins Load more