Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Beyond the Buzzwords: Networks and Security Converge Comcast Business Hybrid work models, cloud adoption, and business process digitization have altered and expanded the cyberattack threat surface. As network configurati... 2 days ago | 61 mins Bring your ESG program out of the shadow Lisa D. Rawls, GRC Tech Service Network Leader, Arun Ghosh U.S. Leader, Climate Data and Tech,Renee Murphy Principal Analyst If you think ESG is low risk today, think again. Unlike a black swan risk that seemingly comes out of nowhere to impact the organization, a gray rhino... 2 days ago | 48 mins Zero Trust: Real-World Tactics and Strategies Jennifer Minella, IANS Faculty; Brandon Dunlap, Moderator No doubt, you’ve heard the buzz about zero trust. Zero trust isn’t a product but rather a journey. While the end goal is worthwhile, like most thing... June 28, 2022 5:00pm Optimise the Policy Lifecycle and Claims Process to Achieve a Seamless CX Jeremy Trott (Ecclesiastical), Liz Ryan (Zurich) Edward de Mas Latrie, Blue Prism, Eddie Longworth (The Claims Think Tank) In this one hour webinar you will: -Understand the most promising use-cases for Robotic Process Automation (RPA), Intelligent Automation and Artific... 2 months ago | 61 mins Compliant Advertising: The Marketing Rule & "Finfluencers" Tiffany Magri, Regulatory Compliance Officer, Smarsh and Annie Kong, Managing Director, IQ-EQ An SEC email campaign is going viral and creating a buzz among RIAs – changes to the marketing rule are coming and they cannot be ignored. The increas... August 24, 2022 5:00pm Demystifying Zero Trust for the C-Level (and the rest of us) Paul Simmonds, CEO Global Identity Foundation Implemented correctly, a Zero Trust architecture / strategy / approach to Information Technology, and the architecture that supports it, has the poten... 2 months ago | 62 mins Making Sense of the Buzz Around SASE Diana Kelley, CTO & Founding Partner @ SecurityCurve and John Grady, Senior Analyst @ ESG With network security demands changing in response to the pandemic-driven move to remote and hybrid working, enterprise security teams are grappling w... 9 months ago | 42 mins Introduction to MLOps: Six proven techniques to amplify AI maturity Rob Gibbon, Product Manager at Canonical If you are working in AI or studying data science, then you might have heard about MLOps and be wondering what the buzz is all about. Data science is ... 2 months ago | 24 mins Authentication: Password & beyond Saurabh Sharma, FIE, CEng(I), SMIEEE, Chief Manager (BIS) & CISO, Petronet LNG Limited We all know that password is the most basic and most popular approach towards securing our devices and applications. Can using passwords alone make us... 3 months ago | 48 mins Low Code and Decoupled - A Technical Guide Tim Lehnen, Chief Technology Officer, Drupal Association and Ron Northcutt, Director Of Developer Advocacy, Acquia There is a lot of buzz around decoupled CMS solutions - and for good reason. To keep up in a world of rapid digital transformation requires a CMS that... 3 months ago | 50 mins Load more