Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date The 2022 Open Source Year in Review Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general co... 3 days ago | 67 mins Tech Talk: Security Edition Using Machine Learning for Hunting Security Threats Muath Saleh, Cyber Security Engineer & Hafiz Farooq, Cyber Security Architect, Matthias Maier, Security PMM Director Splunk Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for AI / Machine Learning based Analytics to supercha... 5 days ago | 40 mins DAST to the Future Jeff Lawson, Product Management | Patrick Carey, Product Marketing Shifting the Modern Application Security Paradigm The emphasis on securing applications in development has not resulted in the reduction of breaches ... February 2, 2023 9:00am Compromises Have Moved Beyond the Endpoint - You Need to Too! Nick Cavalancia - Techvangelism, Stacy Leidwinger - Secureworks, Kevin Johnson - Secure Ideas, Peter Jones - CISO The last few years have seen 10 years of digital transformation compress into 3 years and as a result, the entire architecture behind IT has changed b... 1 week ago | 49 mins Protect Against Modern Active Directory Attacks Patrick Doherty (Vice President Sales Identity Protection), Matthew McDermott (Sales Engineer) The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization... February 28, 2023 10:00am How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 1 week ago | 63 mins The Real Cost of Bad Software Quality in the U.S. in 2022 Herb Krasner, CISQ Advisory Board Member and Mike McGuire, Solutions Manager at Synopsys Tune in to learn more about “The Cost of Poor Software Quality in the US: A 2022 Report” that was recently published by CISQ. The 2020 edition of th... 1 month ago | 51 mins Criteria for Selecting the Right Threat Detection & Incident Response Solution Nick Cavalancia - Techvangelism | George Anderson - Secureworks | Cat Coode - Binary Tattoo | Dom Glavach - CyberSN.com Selecting the right threat detection and incident response solution for your organization can be overwhelming. From Endpoint Detection & Response (EDR... 2 weeks ago | 46 mins Combating Control Failures: How Can Enterprises Stop Preventable Breaches? Andreas Wuchner - Advisor at Panaseer, Dr Rebecca Wynn - Global CISO at Click Solutions Group and Dom Glavach - CSO, CyberSN There’s no denying that the stress of working in cybersecurity in 2023 is huge. Security teams are dealing with increasingly complex environments, han... 2 days ago | 53 mins EPP vs EDR: difference, use cases, adoption Nikita Zaychikov, Senior Product Marketing Manager at Kaspersky Global Endpoint Detection and Response adoption is on the rise, making it a de-facto standard for many organizations. Everybody has heard about it, b... 3 days ago | 62 mins Load more