Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Take Action: Putting Open Source Risk Management Policies to Work Aditi Sharma, Dell; Patricia Tarro, Dell; Mike Phillips, Dell & Anthony Decicco, GTC Law Group Once you have a grasp on how open source can both benefit and introduce risk to your organization, your next consideration should be learning to manag... February 2, 2023 9:00am DAST to the Future Jeff Lawson, Product Management | Patrick Carey, Product Marketing Shifting the Modern Application Security Paradigm The emphasis on securing applications in development has not resulted in the reduction of breaches ... February 2, 2023 9:00am Making It All Work Jeff Lawson, Product Management | Peter Monahan, Dir., Solutions Architecture | Vishrut Iyengar, Product Marketing A Practical Guide to Operationalizing the Modern AppSec Framework You need to modernize your application security program and you know how you are go... 5 days ago | 59 mins Improve Cloud Security Using ChatGPT & AI Itamar Golan, Head of Data Science — Lior Drihem, Director of Innovation — Jacob Graves, Manager, Sales Engineering The power of artificial intelligence (AI) has recently taken center stage in the media with the availability of new tools like Open AI's ChatGPT. In t... February 9, 2023 6:00pm Budgeting for Cloud Security in 2023: Tips for a Tough Economy Andy Ellis, Advisory CISO, Orca Security; Nick Vigier, CISO, Talend; and Guillaume Ross, Deputy CISO, JupiterOne The current economic outlook is increasing pressure to lower costs and drive efficiencies in cloud security operations. But cloud adoption is continui... 6 days ago | 43 mins Orchestrating Secure User Login with Authentication Actions Michal Trojanowski, Product Marketing Engineer at Curity and Gary Archer, Product Marketing Engineer at Curity Identity and access management (IAM) aims to give digital entities the right access to the right resources at the right time. One challenge is to iden... 3 weeks ago | 51 mins High-Storage Mainframe Health, Backup, & Resilience Best Practices John Crossno, Director, Project Management, Rocket Software IDC reports that data creation and replication will soon grow at a faster rate than installed storage capacity—pushing costs and the likelihood of out... 1 month ago | 45 mins Open Source: A Key Link in the Software Supply Chain Anthony Decicco, GTC Law Group Open source makes the world go round. It’s easy to use and simple to plug in. Used correctly, it gives you the competitive edge you need to focus more... 2 weeks ago | 41 mins Transformation : SAP Security Implementation Lessons From Industry Leaders Eli Black, Rick Hanson, JP Etchegoyen, David D'Aprile Many organizations have correctly realized that security needs to be considered from the start of major digital transformation projects, and have star... January 31, 2023 9:00am Align Your ITSM and SecOps Strategy for Unstoppable IT Eric, Sr Director of Partnership at Freshworks | Chandrashekhar, CEO at SecPod To deal with the rising number of cyberattacks, ITSM strategy should align with SecOps (Security Operations). With SecOps functions merged within the ... January 31, 2023 2:30pm Load more