Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date CISO's Roadmap to Cloud Security: Tackling Threats with Innovative Strategies Nesh (Steven Puddephatt) - Senior Solutions Engineer & Francesco Altomare - Southern Europe Regional Manager @ GlobalDots Today's CISOs face a daunting array of security threats. From ransomware and cloud misconfigurations to zero-day exploits and code vulnerabilities, th... June 15, 2023 12:00pm How To Cross Off - Build A Roadmap to a Secure Hybrid Cloud - On Your To-Do List Michael Newborn, CISO at Navy Federal Credit Union, Lisa Lee, Chief Security Advisor at Microsoft, M. Mestrocvich, CISO How does world class customer service intersect with operating in a secure hybrid cloud? Hear about Navy Federal Credit Union’s secure cloud journey ... June 28, 2023 1:00pm CyberSaint Roadmap Review: Risk Presets, Cyber Risk Actuarial Data - APAC Padraic O'Reilly, Co-Founder & Chief Product Officer | Scott Shidlovsky, VP of Engineering Learn more about what's coming to the CyberStrong platform, including, Advisen data-backed Risk Presets with pre-populated loss frequency, loss exposu... 2 weeks ago | 34 mins The Role of Quantum Teleportation in Entanglement-based Secure Networks Michelle Chalupnik Quantum Secure Communication, as achieved by Entanglement-based Secure Networks, relies on the physics of teleportation. Join Michelle Chalupnik, Res... June 15, 2023 5:00pm CyberSaint Roadmap Review: Risk Presets, Cyber Risk Actuarial Data - EMEA Padraic O'Reilly, Co-Founder & Chief Product Officer | Scott Shidlovsky, VP of Engineering Learn more about what's coming to the CyberStrong platform, including, Advisen data-backed Risk Presets with pre-populated loss frequency, loss exposu... 3 weeks ago | 34 mins The Present and Future State of Ransomware Readiness and Recovery Badri Raghunathan, Director of Security Product Management, Druva As the largest, most mature SaaS data protection provider in the market, Druva sees more telemetry than any other data protection player. Learn how re... 1 month ago | 19 mins How to Integrate a Quantum Network with Your Existing Network Bruno Rijsman Join Bruno Rijsman, Aliro Fellow, as he explains how entanglement-based quantum networks seamlessly integrate with classical networks. In this webin... 1 month ago | 62 mins How Does Your Cloud Security Compare, and Where Do You Go From Here? Lior Zatlavi Senior Cloud Architect of the Ermetic Cloud Security Maturity Model Ermetic With the rise in cyber threats, your cloud infrastructure growing and devops demanding privileged access, you can no longer approach cloud security op... 6 months ago | 38 mins How To Achieve Zero Trust Patrick Sullivan, Akamai | Dan Petrillo, Akamai | Aleksandar Radosavljević, STADA Group Zero Trust is no longer just a buzz phrase. It has become a business staple. Zero Trust represents a move away from “trust but verify” to “never trust... 3 months ago | 43 mins How does quantum entanglement work inside a Quantum Network? Daniel Winton The day a quantum computer is capable of cracking the encryption we use everyday to keep our communications secure - from email to financial transacti... July 13, 2023 5:00pm Load more