Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Is Your Security Engineered To Beat Social Engineering? Matt Aldridge, Principal Solutions Consultant Social engineering tactics – using the art of deception in cyberattacks – have climbed to the top spot as the #1 cause of cybersecurity breaches. Our ... 3 days ago | 44 mins Getting Started with Carbonite® Migrate Demonstration Many situations might prompt an organization to migrate data, like a merger, hardware upgrade, a move to the cloud or application end-of-life. But all... 2 weeks ago | 6 mins Detection and Response: Neutralising and Minimising Cyber Threats Matt Aldridge, OpenText | Steven Wood, OpenText | Ash Hunt, Sanne In light of evolving cyber risks - from ransomware, to phishing, to social engineering - it is no longer a question of “if?” but “when?” attacks will ... 2 weeks ago | 39 mins The Growing Threat of Ransomware: How to Mitigate your Risk Dave Gruber, Principal Analyst at ESG - Keith Jarvis, Sr. Security Researcher, CTU-TR at Secureworks Readiness is essential. How will your organization weather the ransomware storm? o What you’ll Learn: o How to proactively defend against the ever-i... August 24, 2022 1:00pm Cross-cloud security controls: impossible dream or new frontier? Pali Surdhar, Director of Product Security, Entrust & Dale McKay, Senior Technical Marketing Architect, VMware The journey to the next generation of cloud-based deployments has created a “virtual” nightmare of tools, technologies, complexities, and vulnerabilit... August 24, 2022 3:00pm Security Resilience in a Hybrid World Sean Earhard, Director of Sales Business Development, Cisco and Krystal James, Sales Business Development Manager, Cisco Security resilience is confronting a new world where everyone and everything is connecting. Businesses are operating as integrated ecosystems with bou... 1 month ago | 23 mins Detection and Response: Neutralising and Minimising Cyber Threats Matt Aldridge, OpenText | Steven Wood, OpenText | Ash Hunt, Sanne In light of evolving cyber risks - from ransomware, to phishing, to social engineering - it is no longer a question of “if?” but “when?” attacks will ... September 1, 2022 9:00am 2021 OWASP Top 10: Identification and Authentication Failures - Ep7 John Wagnon, Solutions Architect, F5 It is critical to confirm identity and use strong authentication and session management to protect against business logic abuse. Most authentication a... 4 weeks ago | 11 mins IT OT convergence: Mitigating today's risks, driving sustainability for tomorrow Emily Crawford, Joe Bastone, Friedrich Richter, Johnannes zu Eltz, Alberto Corti, Patrick Sjostedt The risk of business disruption is always present. But recent events namely the global health and the geopolitical crisis in Europe - have led to a re... 1 day ago | 37 mins How Boards Can Prepare and React to Crisis Carolyn Clark, Chief Executive, Brave Consultancy, & James McAlister, Director, Crisis Prepared When your business faces a crisis, your ability to react is key to staying ahead of a challenging situation. Are you able to stay proactive with the r... 10 hours ago | 50 mins Load more