Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Webinar: Complying with CSA’s Cybersecurity Code of Practice (CCoP) 2.0 Jason Teo, Regional Sales Director, Imperva & Wang Jie He, Senior Sales Engineer, Imperva As we enter into the new year 2023, one key priority for Critical Information Infrastructure (CII) operators to be mindful of, is the need to comply w... 4 months ago | 41 mins Protect Against Data Loss from Departing Employees on Unmanaged Devices Stephanie Torto, Sr Product Marketing Manager, Proofpoint & Michael Gordover, Principal Security Architect, Proofpoint Employees have been leaving their jobs, whether voluntarily or involuntarily, at an unprecedented rate during the past several years. As a result, 50%... 7 months ago | 31 mins Role of Artificial Intelligence in Information Protection Itir Clarke & Chris Muffat Artificial Intelligence (AI) and Machine Learning (ML) are beginning to shape information protection and cloud security. With massive growth in data ... 10 months ago | 61 mins Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search Brenden Bishop, Data Scientist, the Columbus Collaboratory Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corpo... 4 years ago | 44 mins Kubernetes Master Class: Detecting anomalous activity in Rancher with Falco Pawan Shankar, Director, Secure Product Marketing, Sysdig & Vicente Garcia, Technical Marketing Engineer, Sysdig Securing Kubernetes requires putting controls in place to detect unexpected behavior that could be malicious. Examples include: - Exploits of unpatch... 3 years ago | 70 mins Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search Brenden Bishop, Data Scientist, the Columbus Collaboratory Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corpo... 4 years ago | 43 mins Under the Hood: Setting Guardrails for your K8S Cluster with Admissions Control Alfred Trevino, Cloud Technical Marketing Manager As we saw during last Under The Hood session, CloudGuard offers the ability to enforce compliance with industry regulations and security best practice... 6 months ago | 71 mins Get to know LogRhythm’s Advanced Analytics UEBA Melissa Ruzzi With the dramatic increase in the number of cyberattacks related to users' advanced complexity and sophistication, it becomes more and more important ... 1 year ago | 36 mins Is that Anomaly an Enemy? Understanding the Importance of Security Analytics Ted Kietzman, Product Manager, Duo Security With the rise in identity-based attacks due to the very distributed and remote workforce of 2020, how can your organization identify whether or not it... 3 years ago | 46 mins [APAC] Get to know LogRhythm UEBA (CloudAI) Melissa Ruzzi With the dramatic increase in the number of cyberattacks related to users' advanced complexity and sophistication, it becomes more and more important ... 1 year ago | 36 mins Load more