Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Trade Surveillance in Equities and Crypto Markets Speakers: Steve Wilcockson, KX, Charles Gregory, KX, Justin Handsman, KX In a world where the smallest margins represent millions of dollars, attempts to manipulate the market are inevitable. And with few regulations govern... August 18, 2022 2:00pm WebShell Intrusion Live Attack & Defend Demo [EMEA] Falcon Complete EMEA Analysts This webinar will be delivered by the CrowdStrike Falcon Complete team where they will respond live to an exploit leveraging a vulnerable public facin... 6 days ago | 55 mins Human Factor Report 2022: 5 myths of Social Engineering Andy Rose, Resident CISO, Proofpoint; and Jenny Radcliffe, Cybersecurity Consultant, The Human Factor Have you heard of the new breed of “Friendly” fraudsters? Trust is an essential component of social engineering. To persuade someone to interact with ... 6 days ago | 49 mins Fixing a Crucial Shortfall in Your AppSec Program Dr Carsten Huth - Checkmarx Global Head of AppSec Advisory The need for effective AppSec these days is about as debatable for most software teams as the need for oxygen. What many fail to prioritize, though, i... August 24, 2022 3:00pm Connect Enablement & Intelligence to Deliver a Personalized Customer Experience Nick Thompson, Vice President of Product Marketing at Mediafly There is a lot of activity during the buying and selling process. Buyers do their own research by engaging content, competitors, their network, and mo... 4 weeks ago | 21 mins Empowering Sales Through Intent Seth Marrs, Principal Analyst at Forrester and David Pitta, CMO at BrightTALK Your sales team is only as effective as the intelligence at its fingertips. Too many B2B tech sales organizations are leaving money on the table becau... 4 weeks ago | 42 mins Human Factor Report 2022: 5 myths of Social Engineering Andy Rose, Resident CISO, Proofpoint; and Jenny Radcliffe, Cybersecurity Consultant, The Human Factor Have you heard of the new breed of “Friendly” fraudsters? Trust is an essential component of social engineering. To persuade someone to interact with ... 1 month ago | 49 mins Intent Data in Action Across APAC: 5 Use Cases You Should Know Meaghan Nichols, Director, Client Consulting APAC (TechTarget) There’s undoubtedly a lot of hype surrounding the use of intent data to propel marketing and sales activity. Within the technology space, data is powe... September 28, 2022 3:00am Active SAP Exploitation Activity Identified by the Onapsis Research Labs Richard Puckett:CISO SAP, Juan Pablo Perez-Etchegoyen:CTO Onapsis, Stephanie Kennelley Vulnerability Disclosure Analyst:CISA The Onapsis Research Labs continuously monitors the evolving SAP threat landscape to rapidly identify elevated risk, trending threat behavior and acti... August 16, 2022 8:00am OWASP Automated Threats: 21 Fraud Street Byron McNaught | Kyle Roberts | Dan Woods Organizations’ online environments are increasingly being targeted by bots and automated attacks that lead to fraud – with seemingly endless evolving ... August 16, 2022 5:00pm Load more