Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Zebra’s Secret Sauce for Securing the Development Lifecycle Dr. Jasyn Voshell, Dir of Product Security & Solutions-Zebra Technologies & Ashley Goldstein, ENT Account Executive-HackerOne During this 45-minute webinar, Zebra Technologies lets you in on the secret of how they slashed pentesting costs while completing tests at the pace of... 2 weeks ago | 50 mins Using Threat Modeling to Improve Enterprise Cyber Defenses John Pironti, IP Architects president | Terry Sweeney, Dark Reading | Yaniv Bar-Dayan, Vulcan Cyber CEO As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... 2 weeks ago | 62 mins How to Perform Effective Web Application Security Assessments Leanne Shapton - Portswigger, Joel Noguera - Hacker & Pentester, Cindy Ho - HackerOne Security reviews and assessments can take a lot of effort and still not provide the results you are looking for, especially in the face of ever-expand... August 23, 2022 4:00pm The digital transformation is here: Is your cybersecurity transforming too? Ashley Guerra, SecureLink’s Product Marketing Manager Digital transformation is taking over many industries — transforming the way previously analog, brick-and-mortar organizations operate. As this transf... August 10, 2022 5:00pm Ed TALKS: Scaling AppSec – Getting Tools to Perform Ed Adams, Security Innovation | Dustin Lehr, Fivetran | Rajan Gupta, Honeywell | Joe Basirico, Highspot Modern application design and the continued adoption of DevOps expand the scope of automated security testing and push tools to the limit. Simultaneou... August 10, 2022 5:00pm Building Trusted Digital Experiences with Customer Identity Clare Robson, Director Solutions Marketing, APAC Digital Business is here to flourish. It is hard to find an industry or sector in the economy that is not disrupted by software. Right now, businesses... August 12, 2022 12:00am The steps to sensible auto-remediation Patrick Duffy - Senior Product Manager and Ray Pugh - Manager, Security Operations Timely remediation: It’s critical to responding to active threats in an environment. Knowing when (and when not) to apply automation is equally import... August 16, 2022 4:00pm TPRM - High Performance Across the Vendor Lifecycle: Focus on Vendor Validation Alfonso Hermosillo - Consulting Engineer, EMEA; Nuno Almeida - Consulting Engineer, EMEA BitSight is hosting a monthly webinar series exclusively dedicated to you: During 30 minutes, our experts will answer all the essential questions on v... 2 weeks ago | 37 mins AI vs Ransomware: Before, During and After Zach Atya, Director of Insurance at Measured Insurance | Adam Mansour, Chief Security Officer at ActZero Join cybersecurity experts from two AI-powered organizations, Adam Mansour of ActZero.ai and Zach Atya of Measured Insurance, as they discuss the impl... August 12, 2022 2:30pm Aqua Cloud Native Security JumpStart: Kubernetes Security Iheanyi Njeze, Solutions Architect According to the Cloud Native Computing Foundation’s annual survey, Kubernetes use in production has increased to 83%, up from 78% the year before. ... August 16, 2022 3:00pm Load more