Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Know Thy Enemy in 30 Minutes Steve Benton, VP Anomali Threat Research, Anomali and Nate Huber, Former Intel Analyst, FBI “If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art of War BC500 Press, media, open source, and vend... March 28, 2023 3:00pm Understanding DSPM to Manage Your Cloud Data Risk Oren Sade, Technical Product Leader — Jason Silberman, Sr. Product Marketing Manager Securing sensitive data is one of the main focal points of cloud security. Data is scattered across multiple cloud service providers and data stores, ... March 29, 2023 6:00pm The Ultimate Guide to CNAPP and How to Identify the Right One For You Jim Reavis, Cloud Security Alliance; David Sedgwick, Zscaler As organizations adopt cloud technologies and their digital workloads grow more complex, it becomes more challenging to maintain a secure environment.... March 30, 2023 4:00pm Under the Hood: Preemptive Web Application Protection using Contextual AI/ML Marlon Chung, Cloud Security Architect, Check Point Software Technologies. Join this upcoming webinar to learn about CloudGuard AppSec, a next-generation web application firewall (WAF) that provides superior protection for we... March 30, 2023 3:00pm Abnormal Demo Day: Why Security Posture Management is Crucial for Cloud Email Anthony Coggins, Sr. Manager, Security Operations, Acrisure & Mick Leach, Security Operations Manager, Abnormal Security Cloud email platforms are a cornerstone of an organization’s digital environment. The ability to integrate mission-critical third-party applications a... 5 days ago | 36 mins SASE’s Value in Manufacturing Dave Greenfield, Howard Holton Webinar Overview Together with Howard Holton, CTO of GigaOm analyst firm, and a 30-year veteran, understand major networking and security challenge... 21 hours ago | 57 mins Selecting a CSPM solution for Dynamic and Complex Cloud Environments GigaOm Analyst Cybersecurity Chris Ray, Check Point Manager of Cloud Security Center of Excellence Aaron Brongersma CSPM solutions improve the security posture of multicloud environments by proactively identifying and remediating critical misconfigurations. Differen... 6 days ago | 77 mins Reframing Application Security for Modern Apps and Tighter Budgets Liav Caspi & Jason Chan AppSec programs have long relied on a traditional approach, using gates, reviews, and scanning tools to achieve security and compliance. But a new era... March 29, 2023 5:00pm Building a Modern Exposure Management Program Paul Giorgi, Director of Sales Engineering North America This session provides a comprehensive overview of the evolution of vulnerability management and explains why critical vulnerabilities do not necessari... 2 days ago | 40 mins Public Key Infrastructure as a Service vs. Traditional PKI Alon Nachmany, Field CISO, AppViewX While Public Key Infrastructure (PKI) is fundamental to enterprise security, traditional PKI deployments are often complex, expensive and a burden to ... 5 days ago | 35 mins Load more