Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Webinar: Complying with CSA’s Cybersecurity Code of Practice (CCoP) 2.0 Jason Teo, Regional Sales Director, Imperva & Wang Jie He, Senior Sales Engineer, Imperva As we enter into the new year 2023, one key priority for Critical Information Infrastructure (CII) operators to be mindful of, is the need to comply w... 2 months ago | 41 mins Under the Hood: Setting Guardrails for your K8S Cluster with Admissions Control Alfred Trevino, Cloud Technical Marketing Manager As we saw during last Under The Hood session, CloudGuard offers the ability to enforce compliance with industry regulations and security best practice... 3 months ago | 71 mins Protect Against Data Loss from Departing Employees on Unmanaged Devices Stephanie Torto, Sr Product Marketing Manager, Proofpoint & Michael Gordover, Principal Security Architect, Proofpoint Employees have been leaving their jobs, whether voluntarily or involuntarily, at an unprecedented rate during the past several years. As a result, 50%... 5 months ago | 31 mins Best Practices for Cloud Infrastructure Entitlement Management (CIEM) Lior Zatlavi, Senior Cloud Security Architect, Ermetic As organizations migrate to the cloud, securing human and machine identities in production environments is critical, but cloud complexity and necessar... 4 months ago | 54 mins [APAC] Get to know LogRhythm UEBA (CloudAI) Melissa Ruzzi With the dramatic increase in the number of cyberattacks related to users' advanced complexity and sophistication, it becomes more and more important ... 10 months ago | 36 mins Is that Anomaly an Enemy? Understanding the Importance of Security Analytics Ted Kietzman, Product Manager, Duo Security With the rise in identity-based attacks due to the very distributed and remote workforce of 2020, how can your organization identify whether or not it... 3 years ago | 46 mins Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search Brenden Bishop, Data Scientist, the Columbus Collaboratory Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corpo... 4 years ago | 44 mins Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search Brenden Bishop, Data Scientist, the Columbus Collaboratory Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corpo... 4 years ago | 43 mins Early bird gets the (fraud) worm: how to proactively detect online scams Alasdair Rambaud, Head of Fraud at Ping Identity and Ran Wasserman, Principal Architect at Ping Identity About The growth and advancement in the online digital space and eCommerce is making it easy for consumers to transact over the internet, but it’s als... 1 year ago | 48 mins Stories from the SOC: Identifying infected machines through anomalous behavior Dan Pitman, Principal Security Architect & Aled Evans, Solution Engineer Polymorphic malware is notoriously hard to detect, requiring more than a signature-based approach. In this Story from the SOC learn about how Alert Lo... 2 years ago | 25 mins Load more