Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 2021 OWASP Top 10: Software and Data Integrity Failures - Ep8 John Wagnon, Solutions Architect, F5 This new risk category focuses on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. The ... 3 weeks ago | 8 mins Demo: Inside Radware's Cloud Native Protector Steven Puddephatt, Senior Solutions Engineer at GlobalDots How many of your users’ cloud permissions are actually necessary? Can there be one source of truth for vulnerabilities in multi-cloud environments? An... 1 year ago | 11 mins Safer, Smarter: Cloud WAF 2.0 (Hebrew) Dror Arie, senior solution architect at GlobalDots Cloud transformation is an opportunity to implement a WAF that fits your new, agile IT infrastructure. Appliance-based WAF, or a migrated one, is insu... 5 months ago | 35 mins Steps to Test Your Ransomware Readiness Posture Adam Mansour, Chief Security Officer, ActZero | Jim Skidmore, Vice-President - Solutions Group, intiGROW Most cyber defense teams are unaware of how much ransomware evolves over a 24-hour period, which is part of why ransomware "is present in almost 70% o... 1 week ago | 60 mins Streamlining, Securing, & Protecting Cloud, IT, & Business Ops with Kasten K10 Adam Bergh, Solutions Architect & Cloud Native Technical Partnerships, Kasten by Veeam IT pros and decision makers must prioritize continuous improvement, well, continuously. The job requires constant vigilance for new opportunities to m... August 25, 2022 4:00pm Opening Remarks | Smart Strategy + Focused Execution = “A Category of One” Craig Pfeiffer, Jack Sharry and Jed Finn 9:30 AM EDT | Opening Remarks Craig Pfeiffer, President & CEO, Money Management Institute 9:35 AM EDT | Smart Strategy + Focused Execution = “A Categ... 2 months ago | 32 mins Verizon Threat Research Advisory Center MIB Dave Kennedy, Kevin Horvath, Matthew Clark Join us—the Verizon Threat Research Advisory Center – for our Monthly Intelligence Briefing (MIB) to discuss how our organization works to identify cl... 3 weeks ago | 77 mins Simplifying CMMC Series Part 1: Scoping and Managing Your Data Amy Williams s your company trying to understand how to scope and manage data for CMMC Compliance? If so, join us for the first in a two-part CMMC webinar series w... 3 weeks ago | 26 mins SOC 2 Bootcamp: Part 1 - Scoping and Auditor Selection Monica McMahen, Director of Demand Generation and Jitendra Juthani, Director of InfoSec Risk and Compliance SOC 2 is a well-defined process, but every company has to customize it to their unique business. To help you understand what this entails, we are brea... 2 months ago | 59 mins Six Popular Use Cases Enabled by a Logical Data Fabric (APAC) Fern Halper, TDWI VP Research, Sr Research Director-Advanced Analytics & Robin Tandon, Director of Product Marketing, Denodo As organizations look to become more competitive, they are modernizing their data environments to support new data types and new analytics methods. Th... August 23, 2022 5:00am Load more