Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Operationalizing Third Party Cyber Risk Management Ewen O'Brien, Senior Vice President, Cyber Third Party Risk, BlueVoyant When it comes to keeping up with an organization’s critical threats, it’s important to have visibility into your third parties. Traditionally, organiz... 1 week ago | 33 mins The Critical ‘3 P’s’ of Incident Response Planning Adam Mansour, Chief Security Officer | Aaron McIntosh, Director of Product Marketing There’s no better time to deal with a cybersecurity incident than before it has ever happened. Most midsize businesses have at the very least a bare-b... 7 hours ago | 30 mins SANS: Ransomware Defense in 2022 Matt Bromiley, SANS Certified Instructor + Chris Borales, Sr. Product Marketing Manager - Gigamon Originally aired on a SANS webcast. The years 2020 and 2021 were undoubtedly the years of ransomware. Threat actors wasted no time taking advantage o... 1 day ago | 75 mins Cyber Deception with MITRE Engage for Zero trust networks Bill Hill, CISO at Mitre and Sahir Hidayatullah, Vice President of Active Defense at Zscaler Today’s advanced attackers are skilled at bypassing security controls using stealthy, human-operated tactics. Adding more detection technologies doesn... 2 weeks ago | 63 mins Cyber deception with MITRE Engage for zero trust networks - ASEAN Sahir Hidayatullah, VP Active Defense, Zscaler & Dr. Stanley Barr, Sr. Principal Cybersec Researcher & Bill Hill, CISO, Mitre Today’s advanced attackers are skilled at bypassing security controls using stealthy, human-operated tactics. Adding more detection technologies doesn... 1 month ago | 63 mins Data-Centric Security Evolution: Data protection in the hybrid cloud era Terry Ray, SVP, Data Security GTM, Imperva & Heidi Shey, Forrester Analyst Featuring Forrester Analyst Heidi Shey In a rapidly changing threat environment, traditional defenses like network perimeter security, data repositor... 2 days ago | 63 mins Findings From 2022 Cyberthreat Defense Report Steve Piper, Founder and CEO of CyberEdge Group, and Carolyn Crandall, Chief Security Advocate, Attivo Networks Attivo Networks is proud to sponsor CyberEdge’s 2022 Cyberthreat Defense Report. Now in its ninth year, this report provides a comprehensive review of... 1 month ago | 60 mins Life of a CISO Eric Cole, PhD, is an industry-recognized security expert with over 20 years of hands-on experience. In this podcast, Dr. Cole will provide a playbook for approaching organizational security from this perspective. You’ll learn how a proper foundation ... 2 weeks ago | 48 mins Think Like An Attacker to Take Control of Your Active Directory Defenses Derek Melber, Senior Director, Customer Evangelist & Microsoft MVP, Tenable Attackers are really good at identifying and leveraging Active Directory attack paths to comprise your networks. In this on-demand webinar, we’ll flip... 2 months ago | 59 mins Would Your Organization Fail the Active Directory Security Assessment? Darren Mar-Elia and Ran Harel As cyberattacks proliferate, many organizations are investing resources in plugging holes in their security strategy. But one common attack entry poin... 2 months ago | 54 mins Load more