Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date ShardSecure Demo: The CIA Triad Zack Link, Sales Engineering Director Our innovative, patent-pending Microshard (tm) technology is built upon tried and true best practices and closely follows the CIA triad of confidentia... 5 months ago | 14 mins Cybersecurity Compliance: Expert Tips from the former CIO of the CIA Alan Wade (Former CIO of the CIA) with Rob Simopoulos (Co-Founder of Defendify) How do you know if you can pass a security assessment from a key customer, partner, industry group, or government agency? Alan Wade, the former Chie... 1 year ago | 47 mins Insights from Former CIA Analysts: Spotting Fake News to Protect Your Org Perry Carpenter, Rosa Smothers, Cindy Otis Fake news and disinformation have become an unfortunate part of our everyday lives. And the bad guys are using it to influence you and affect your org... 1 year ago | 61 mins A Former FBI Agent Shows How to Fend off Inherent Vulnerabilities Attacks Dan Woods, Global Head of Intelligence, F5; James McQuiggan, Moderator There are a myriad of bad actors leveraging multiple attack vectors and vulnerabilities on an on-going basis. Detecting and preventing attacks against... 5 months ago | 58 mins Defending Against Ransomware in the Cloud Zack Link, Sales Engineering Director Our patent pending Microshard (tm) technology is rooted in the CIA triad - confidentiality, integrity, and availability. In this demo, Zack will focus... 5 months ago | 5 mins Ultra AI - Building Corporate Intelligence Agency (CIA) - Part 1 Thomas B. Cross Business Espionage & Sabotage Seminar on Building a Corporate Intelligence Agency (CIA) "Competitors have this time prevented us from knowing enough a... 3 years ago | 31 mins Unraveling supply chain attacks and the ongoing Microsoft Exchange fallout Joel Bork, Senior Threat Hunter, Peter Rydzynski, Threat Analysis Lead & Joey Fitzpatrick, Threat Intel Analyst More supply chain attacks and vulnerabilities. Rarely identified CIA malware detailed by Kaspersky. Is Kaspersky compromised due to its connection to ... 1 year ago | 51 mins Unraveling supply chain attacks and the ongoing Microsoft Exchange fallout Joel Bork, Senior Threat Hunter, Peter Rydzynski, Threat Analysis Lead & Joey Fitzpatrick, Threat Intel Analyst More supply chain attacks and vulnerabilities. Rarely identified CIA malware detailed by Kaspersky. Is Kaspersky compromised due to its connection to ... 1 year ago | 51 mins Combating Increased Fraud Risk During the Pandemic Tim Lietz, CIA, CRMA – Director Risk Advisory Services and Deron Rossi, CFS – Fraud Subject Matter Expert, Experis Finance Fraud Risks are Increasing...Why is this happening to organizations? Where could fraud occur in your organization? What should organizations be doing ... 2 years ago | 59 mins How I Became a Cyber Security Innovator (Part 1) Eric Cole I get asked all the time how I became one of the world’s first CISOs, and how my education and work experience influenced my life and career. In this ... 11 months ago | 33 mins Load more