Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Ways to Establish Zero Trust in the Cloud with Orca Security and AWS Ty Murphy, Director of Product Marketing at Orca Security & Dudi Matot, Security Segment Lead at AWS Establishing a Zero-Trust program is a critical strategy to help security teams govern security across cloud and on-premise environments. As an AWS So... February 16, 2023 7:00pm Cyber Security: One Problem, One Purpose, One Answer Jason Rivera, Director, Strategic Threat Advisory Group, at CrowdStrike On this session, Jason Rivera, Director, Strategic Threat Advisory Group, at CrowdStrike will share his perspective on how to detect, react and remedi... February 16, 2023 10:00am Container Security Essentials David Benas, Associate Principal Consultant, Synopsys As the popularity of cloud-native applications continues to surge, containers are becoming the preferred option to package and deploy these applicatio... 1 month ago | 61 mins Ransomware Live Attack & Defend Demo Tom Brown, Alex Sayavedra, Alice Allsop, Marc Paridimal (CrowdStrike) Threat actors are getting bolder, stakes are higher, ransom costs and extortions are growing exponentially. These attacks can cause huge financial and... March 2, 2023 10:00am Defending Against Ransomware With CrowdStrike And ServiceNow Jason Rivera, CrowdStrike; Alex Cox, ServiceNow; Jonathon Brown, TechTarget Ransomware is one of the most serious cybersecurity threats facing organizations today. The past few years have seen a rise in such attacks and in the... 2 months ago | 47 mins 5 Critical Capabilities To Go From Legacy To Modern Endpoint Security [EMEA] Anne Aarness (Sr. Product Marketing Manager), Rachel Scobey (Technical Product Marketing Manager) According to one estimate, there will be 29.3 billion networked devices globally by 2023. Organizations and security teams are facing challenges like ... 3 months ago | 40 mins Mobile Threat Landscape [EMEA] David Williams (Senior Engineer), Connor Brant (iOS Researcher), Gabriel Cirlig (Lead Android Researcher) Mobile devices are now our primary access point for communications, finances, and our social lives –because of this, cybercriminals are increasingly f... 3 months ago | 71 mins Protect Against Modern Active Directory Attacks Patrick Doherty (Vice President Sales Identity Protection), Matthew McDermott (Sales Engineer) The adversary has evolved. 80% of modern attacks are identity-driven and Active Directory (AD) is often considered the weakest link in an organization... February 28, 2023 10:00am Navigating Cybersecurity Threats, Challenges and Innovation in 2023 Augusto Barros, Cyber Security Evangelist; Findlay Whitelaw, Insider Threat; Kayzad Vanskuiwalla, Customer Success The threat landscape will continue to change creating new challenges for organizations. How will threats that are relevant today evolve in 2023? Will... 4 hours ago | 46 mins Deep Observability: Critical Solution to Cloud Migration Baseer Balazadeh, Senior Technical Marketing Engineer - Gigamon Originally aired on an ActualTech Media webcast. Securing hybrid and multi-cloud workloads and supporting infrastructures is a daunting challenge for... 10 hours ago | 29 mins Load more