Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Achieve Complete Cyber Risk Management Yaniv Bar-Dayan, Vulcan Cyber CEO Register to watch this CyberRisk Summit keynote replay and learn how to achieve complete cyber risk management across all of your cyber risk surfaces.... August 23, 2022 4:30pm Demystifying Multi-Cloud Kubernetes Operations and Management with VMware Tanzu Paul Nashawaty, ESG; Nathan McAfee, ESG; Anu Srinivasa, VMware Tanzu A modern infrastructure is critical for any business wanting to stay competitive in today’s digital-first landscape, yet many companies are falling sh... August 24, 2022 8:00am Reducing the Burden of Vulnerability Management at Scale Noy Sinai, Vulcan Cyber VP of operations / Tony Taylor, Vulcan Cyber solution architect Register to watch this CyberRisk Summit keynote replay and learn how to approach cyber risk management at enterprise scale. Vulnerability-generated cy... August 30, 2022 4:30pm Solving Today's Application Security Challenges Tal Morgenstern, Vulcan Cyber CSO / Susana D'sa, Vulcan Cyber solution architect Register to watch this CyberRisk Summit keynote replay and learn how to solve today's application security challenges. Watch this webinar to learn mor... September 6, 2022 4:30pm DevOps Teams: Why the Cloud Risk Encyclopedia Should Be Your New Best Friend Bar Kaduri, Cloud Threat Researcher; Liran Lavi, Dir. of DevOps; Jason Silberman, Dir. of Product Marketing The Cloud Risk Encyclopedia (CRE), a free and open resource, includes a collection of common cloud security risks pulled directly from the Orca Cloud ... 1 month ago | 26 mins Work Smarter, Not Harder: Standardizing Device Lifecycle Management Curtis Armstrong, Field Engineer, Jamf Let's be honest. IT admins face unexpected challenges like onboarding new and experienced teachers, introducing new technology, or distributing studen... 2 months ago | 22 mins How to unify brand experience: a Hootsuite story Nate Holmes, Senior Product Marketing Manager at Acquia Is your brand content difficult to manage, creating bottlenecks across global workflows? Are your teams struggling to quickly find approved files so m... 4 months ago | 29 mins Understand Threat Detection and Response Solutions and Services Natalie Timms, Security Consultant and Advisor Threat detection has become an important consideration for entities of all sizes and verticals. What originally began as logging and security-centric ... 15 hours ago | 38 mins Active SAP Exploitation Activity Identified by the Onapsis Research Labs Richard Puckett:CISO SAP, Juan Pablo Perez-Etchegoyen:CTO Onapsis, Stephanie Kennelley Vulnerability Disclosure Analyst:CISA The Onapsis Research Labs continuously monitors the evolving SAP threat landscape to rapidly identify elevated risk, trending threat behavior and acti... 15 hours ago | 35 mins How to Maximize Returns on Conversions Data with a First-Party Data Strategy Jenna Fair, Partner Development Sr. Director - Technology, Tealium As the industry moves more towards a privacy-centric world, Tealium continues to build on our leadership position in the market to guide our customers... August 18, 2022 5:00pm Load more