Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date What's New with Diligent: Spotlight on Cybersecurity Daryn Duliba, Senior Client Executive, Diligent and Christian Starnes, Solutions Engineer, Diligent From 2019 to 2020, cyber intrusions increased by 400%, prompting increased scrutiny of how corporate boards oversee cybersecurity issues. People, proc... 2 weeks ago | 65 mins Pump Up Your Protection Strategy to Move from Surviving to Thriving Gary Lyng, VP Product & Solutions, Hitachi Vantara | Bryan Glick, Editor in Chief, Computer Weekly & VP, TechTarget Data protection and cyber resiliency isn’t just an IT problem: all departments need to understand how choosing not to fully invest impacts the entire ... 4 weeks ago | 30 mins Closed loop real time validation for EV Power Electronics using dSPACE tools Dr. Jihas Khan - Senior Specialist & Ms. Shruti Prins - Specialist Closed loop real time validation of automotive charging systems and power converters using dSPACE 5 months ago | 2 mins OSM Release THIRTEEN overview Francisco-Javier Ramón Salguero, Gerardo García de Blas, Mark Beierl This webinar offers an overview of the recently announced ETSI Open Source MANO Release THIRTEEN, and a demonstration of some of its latest features. ... 2 months ago | 73 mins Building Proactive Closed-Loop Defenses Steven Tsui Today’s cybersecurity landscape is dire: externally, innumerable attackers with sophisticated skills and weaponized AI, and internally our cyber asset... 2 years ago | 31 mins Achieving Closed Loop Firewall Automation with Batfish Enterprise & Itential Mike Elrom, Senior Solutions Architect at Itential & Samir Parikh, Head of Product at Intentionet In today’s dynamic IT environment, network and security teams often find themselves caught between the need to make network and security changes quick... 1 year ago | 52 mins What's New with Diligent: Spotlight on Cybersecurity Daryn Duliba, Senior Client Executive, Diligent and Christian Starnes, Solutions Engineer, Diligent From 2019 to 2020, cyber intrusions increased by 400%, prompting increased scrutiny of how corporate boards oversee cybersecurity issues. People, proc... 4 months ago | 65 mins Get Hands-On with Closed-Loop Email Analysis and Response Jennica Brodeur from Proofpoint, Neal Iyer from Proofpoint, Dave Cook from Proofpoint Email continues to be the #1 attack vector for cyber criminals. Security teams can train end users to identify and report suspicious email activity, b... 1 year ago | 60 mins Digging for gold in the mountain of data: In Conversation with GemSeek Phil Durand - Senior Consultant, Forsta; Morgan Evans - Managing Director, GemSeek Over 80% of your customers don’t respond to traditional surveys. Yet when the right customer outreach strategies are used, customers are enthusiastic ... 4 months ago | 32 mins Live Demo: The Automated Data Center in Action DJ Spry, Juniper Networks, Director of Product Management Are you ready to reap the benefits of intent-based networking in your data center? Join us to learn how Juniper’s Apstra Solution empowers your IT tea... 1 year ago | 41 mins Load more