Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Beyond Misconfigurations Correlating Threats to Truly Understand Your Cloud Risk Ofer Yarom, Principal Product Manager, Posture Control, Zscaler Today’s attackers leverage sophisticated techniques against their target organizations, using multiple attack vectors to exploit several security weak... 2 months ago | 45 mins Beyond Misconfigurations Correlating Threats to Truly Understand Your Cloud Risk Ofer Yarom, Principal Product Manager, Posture Control, Zscaler Today’s attackers leverage sophisticated techniques against their target organizations, using multiple attack vectors to exploit several security weak... 5 months ago | 45 mins Building a Modern Exposure Management Program Paul Giorgi, Director of Sales Engineering North America This session provides a comprehensive overview of the evolution of vulnerability management and explains why critical vulnerabilities do not necessari... 3 weeks ago | 47 mins How Good is Your Organization’s Cloud and Kubernetes Security Posture? Alba Ferri, Senior Product Manager, Sysdig and Eric Carter, Director of Product Marketing, Sysdig Industry best practices today recommend adopting a continuous compliance mindset. This means leveraging actionable insights towards achieving, staying... 9 months ago | 51 mins How Good is Your Organization’s Cloud and Kubernetes Security Posture? Alba Ferri, Senior Product Manager, Sysdig and Eric Carter, Director of Product Marketing, Sysdig Industry best practices today recommend adopting a continuous compliance mindset. This means leveraging actionable insights towards achieving, staying... 8 months ago | 51 mins CSPM Best Practices for Multi-Cloud: Beyond Native Tools Alba Ferri, Security Product Marketing, Sysdig; Brandon Dunlap, Moderator As multi-cloud adoption accelerates, security teams are navigating the delta between each cloud provider’s native capabilities and comprehensive prote... 1 year ago | 56 mins Simplify ADC Automation for F5 Murali Palanisamy, Chief Solutions Officer, AppViewX ADCs are the force behind applications, and F5 LTM and DNS go beyond their primary function of load balancing to provide application security, advance... 1 year ago | 43 mins A Practical Guide to Securing the Cloud in the Face of Crisis Thomas Martin, former CIO at GE and founder of NephōSec, and Chris Hertz, CRO of DivvyCloud As cyberattackers seek to take advantage of unprecedented changes in how people work, even the most experienced security staff are wrestling with secu... 3 years ago | 55 mins Strategies for Multi-Cloud Security in 2020 Terence Jackson (Thycotic), Tim Bach (AppOmni), Michelle McLean (StackRox) & Thomas Hatch (SaltStack) Organizations continue to grapple with security challenges associated with running applications in the cloud and on-premise. In today's multi-cloud wo... 3 years ago | 58 mins Zero Trust Will Fail If You Keep Making These Common Mistakes Ali Naqvi, Vulcan Cyber senior director of solutions architecture The most disciplined zero-trust initiative is only as strong as its weakest link. Unfortunately, the typical digital infrastructure is replete with we... 2 years ago | 31 mins Load more