Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Session 2: Protect Your Apps and APIs across a Distributed Cloud Richard Bible, F5 Senior Solutions Engineer With cloud architectures, protecting both the application business logic and the underlying infrastructure is paramount. With the F5 Distributed Cloud... 1 week ago | 32 mins Red Teaming Series – EP2 – Red Button, The DDoS Experts Pascal Geenens, Radware | Daniel Smith, Radware | Ziv Gadot, Red Button | Ziv Elyashiv, Red Button In a threat landscape where denial of service is omnipresent, and anyone can become a target, organizations should take a proactive approach to DDoS d... 3 months ago | 45 mins Session 1: Protect Your Apps and APIs across a Distributed Cloud Matthieu Dierick, F5 Senior Solutions Architect With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. With the F5 Distr... 2 weeks ago | 52 mins What the Authn? How Passkeys Offer a Fresh Take to Authentication Dilemmas Derek Hanson, VP, Standards & Alliances, Yubico Everyone is talking about passkeys - but what are they, and what do they mean for the future of authentication? A passkey is a more secure replacement... June 6, 2023 4:00pm (ISC)2 Board Recommended Bylaws Amendments Lisa Young, CISSP, BOD Bylaws Committee Chair; Laurie-Anne Bourdain, CISSP, BOD Secretary; Brandon Dunlap (Moderator) Join us as the (ISC)² Bylaws Committee shares the recommended Bylaws amendments for 2023. Thank you for your input and feedback over the last several ... 3 hours ago | 59 mins From Legacy to Leading-edge: Transforming Your BI with Modernization Saikat Basu, Sr. Solution Architect at Kyligence In today's rapidly evolving business landscape, harnessing the power of data has become essential for organizations to stay competitive. Business Inte... June 7, 2023 5:00pm Fighting Ransomware with Vulnerability Management Andrew Pearson: Principal Security Engineer, Clint Harris, Principal Architect 2, Geoff Mefford, Cybersecurity Consultant 3 Ransomware is one of the biggest threats for organizations nowadays. The expectation is that this threat will grow even further. That is because ranso... June 13, 2023 4:00pm Rapid Data Ingestion with Redis Enterprise Talon Miller, Technical Product Marketing Manager Virag Tripathi, Principle Field Engineer Vital data can end up locked in legacy databases because it seems too complex, time-consuming, and costly to unlock its full potential. Not with Redi... 2 days ago | 26 mins Business Email Compromise: How AI Has Changed the Playing Field Dr Rebecca Wynn, Click Solutions Group | Kate Fazzini, CEO, Blue Line Recoveries Business Email Compromise (BEC) is an example of a phishing attack, used to steal money and/or sensitive corporate data. No organisation is immune to ... June 8, 2023 3:00pm The 2023 Election and Open Call Process Nomination Committee Members: James Packer, CISSP, Chair; Lee Kim, CISSP; Trevor Louis, CISSP. Moderator: Brandon Dunlap The (ISC)2 Nominations Committee will walk members through this year’s election process, starting with our Open Call for Nominations. Any qualified me... 2 weeks ago | 60 mins Load more