Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Cross-cloud security controls: impossible dream or new frontier? Pali Surdhar, Director of Product Security, Entrust & Dale McKay, Senior Technical Marketing Architect, VMware The journey to the next generation of cloud-based deployments has created a “virtual” nightmare of tools, technologies, complexities, and vulnerabilit... August 24, 2022 3:00pm Don’t Put the Cart Before the Horse: What Do I Do to Manage Risk? [EMEA] Mike Kaplan Security vendors and industry analysts continuously come up with a dizzying array of product categories, acronyms, and buzzwords. Hear from Rapid7’s S... 2 days ago | 9 mins Driving Security Resilience in an Ever-Changing World Ankur Chadda - Leader, Product Marketing, Cisco We all know that avoiding cyberattacks one hundred percent of the time is unrealistic. Our networks have become too complex and dispersed to catch eve... 3 days ago | 36 mins How to Leverage Threat-Informed Defense in Your Environment Mike McPhee - Cybersecurity Architect - Cisco Normally agility and innovation are good things. Unfortunately, adversaries have taken these traits to heart, leaving security operations overloaded a... August 24, 2022 12:00pm Moving Beyond Traditional App Security Tools Melinda Marks, Senior Analyst, ESG | Jay Coley, Sr. Security Architect, Fastly Traditional application security tools are not solving today’s problems and traditional tools can create more problems than they solve. False positive... September 7, 2022 1:00pm Through the Eyes of the Wolf: Insights into the Chain of Cyber Threats Stevan Sheely, Technical Solutions Architect, Cisco The once-upon-a-time security architecture that was just a stack of controls at mostly a point in the network for different security vectors is a meth... 1 week ago | 51 mins Tackling Cloud Waste: How eCommerce Giant Reduced Cloud Costs by $1.4M Annually Steven Puddephatt, Senior Solutions Engineer at GlobalDots FinOps, aka Cloud Cost Optimization, introduces financial accountability to the dynamic cloud spending paradigm, which allows collaborative teams to w... August 31, 2022 9:00am Meraki Umbrella SD-WAN Connector: Easy Onboarding to Umbrella SIG Laura Cabana and Johnnie Tabron, Cloud Security Specialists In today’s work from home environment, cybersecurity on and off the corporate network has become more important than ever. Join your Cisco Cloud Secur... September 7, 2022 12:00pm Defeating Ransomware: Security Controls That May Surprise You Jon Villanti, CISO, Allegiance Bank, CISSP and Andres Ruz, CISO, 5 Factor Technology Ransomware has plagued a wide range of organizations for several years and instead of getting better it’s getting worse. On the surface it appears the... 8 hours ago | 53 mins Fireside Chat with Invicti and Clarify360 on Application Security Sonali Shah, Chief Product Officer of Invicti Security & Jo Peterson, VP Cloud & Security Services of Clarify360 During this exclusive fireside chat, moderated by Jo Peterson, Sonali Shah, will look to address the following topics: - Are unsecure applications ju... 12 hours ago | 20 mins Load more