Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Continuous Auditing & Certification: The Future of Security Compliance for SaaS Meiran Galis, Scytale; Mikael Yayon, EY; Raz Kotler, PayPal SaaS companies today are scrambling to comply with certain security frameworks like AICPA SOC 2, ISO 27001, CSA STAR etc., because demonstrating infor... 11 months ago | 59 mins Security Leaders Debate: Cybersecurity Predictions for 2023 Sounil Yu, JupiterOne; Claude Mandy, Symmetry; Fernando Montenegro,Omdia; Kelly Shortridge, Fastly The only constant in the cyber threat landscape is change. With some giant breaches in the news in 2022 (Twilio, Uber), all eyes are on security leade... 7 months ago | 62 mins Data Security Posture Management (DSPM) Across the Multi-Cloud Tyler Young, Chief Information Security Officer at BigID and Ryan Kazanciyan, Chief Information Security Officer at Wiz Data security posture management (DSPM) is either an innovation trigger or alphabet soup. Ultimately, in order to identify meaningful data risk, you m... 7 months ago | 29 mins The Road to GDPR Compliance: Tips from the Cloud Security Alliance and Dome9 Daniele Catteddu of CSA and Marina Segal of Dome9 Security General Data Protection Regulation (GDPR) is coming into effect on May 25, 2018. The requirements of GDPR are substantial and the penalties for non-co... 5 years ago | 57 mins Wrangling Those Pesky 3rd-party Software Vulnerabilities Mayank Goyal, Sr. Security Researcher, Nishtha Behal, Security Researcher, Adobe Like many large software companies, Adobe makes use of both open source and commercial off-the-shelf software components to deliver solutions to its c... 5 years ago | 39 mins Vendor Risk Management from the GDPR to California Privacy (CCPA) Blake Brannon, VP of Products, OneTrust In this webinar, we will deep dive into managing the vendor lifecycle under the GDPR, California Privacy (CCPA), and other global regulations. As orga... 4 years ago | 55 mins 2019 Trends Report: The Zero Trust Journey Kelsey Nelson, Product Marketing, Okta As your workforce becomes more distributed, security is even more critical. Protecting the network is important but it’s no longer enough to secure ap... 4 years ago | 28 mins Top “Must Do” Steps for Securing Your Public Clouds Greg Mayfield, Sr. Director, Product Marketing & Michael Koyfman, Principal Global Solution Architect at Netskope Many enterprises have inadvertently exposed proprietary information by failing to properly secure data stored in public cloud environments like Amazon... 4 years ago | 58 mins Using User Behavior Analytics to Detect Authentication Anomalies Aron Anderson, Senior Security Engineer & Ashwini Cheerla, Security Engineer at Adobe In modern cyber battlefield, we face new threats daily where signatures are not necessarily known. Identifying these anomalies in regular behavior is ... 4 years ago | 55 mins Hackers, Cybercriminals, or Employees - Who Poses the Biggest Threat to the Org? Jon-Michael Brook, Principal: Security, Cloud & Privacy at Guide Holdings LLC The Top Threats Working Group from the Cloud Security Alliance produces annual research on the biggest risks to cloud environments. The recent Top Th... 4 years ago | 58 mins Load more