Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Take Action: Putting Open Source Risk Management Policies to Work Aditi Sharma, Dell; Patricia Tarro, Dell; Mike Phillips, Dell & Anthony Decicco, GTC Law Group Once you have a grasp on how open source can both benefit and introduce risk to your organization, your next consideration should be learning to manag... February 2, 2023 9:00am Proofpoint Intelligent Compliance Michael Rutty, Sr Product Marketing Manager, Proofpoint and Shannon Smith, Regional Sales Director, Proofpoint Organizations need proven, innovative technology to inform compliance decisions, manage information risk and improve investigation readiness. Proofpo... 1 month ago | 32 mins Demo: Get to Know Rubrik for Microsoft 365 Protection Salvatore Buccoliero, Sr. SaaS & Security Engineer at Rubrik Microsoft 365 has become a “gold mine” for threat actors and a prime target for ransomware attacks. Without protection, the immeasurable volumes of da... 1 day ago | 31 mins Address Current Public Key Infrastructure (PKI) Challenges in DevOps Asif Karel, Director of Product Management, AppViewX Public Key Infrastructure (PKI) is used by the DevOps team to ensure authentication and encryption throughout the CI/CD pipeline development process. ... 2 days ago | 50 mins How to Keep Sensitive Data Safe and Compliant Nick Hogg, Director of Technical Training at Fortra Keeping data secure is a constant exercise of fighting cyber threats that change daily and maintaining a strong training program for employees to stay... 1 week ago | 49 mins Trusted Customer View: Drive Stronger CX with Accurate and Compliant Profiles Jennifer Artabane, VP Enterprise Products, and Matt Parisi, Director of Product Marketing, Tealium In order to succeed today, data-driven businesses need to prioritize data privacy and be mindful of how personal data is collected and used. Addition... 3 weeks ago | 34 mins Tips to make your company cyber insurable Ralph Villanueva, IT Security and Compliance Analyst | Hilton Grand Vacations The recent rash of ransomware attacks and evolving cyber security threats make cyber security insurance a necessity, both to protect the company and t... 1 week ago | 59 mins Five Dimensions of Modern Data Provisioning Derek Brink from Aberdeen Strategy & Research, Jorge Lopez from AWS, and Steve Totman from Privitar When you think about what your organization wants, to help realize maximum business value from its data, these are the five dimensions that typically ... 1 week ago | 23 mins Proactive Audit Prep in NetSuite Paul Staz, (VP of Sales and Marketing at Strongpoint, now part of Netwrix) If you’re a publicly traded company running NetSuite, or are in the early stages of planning for your IPO, this webinar will help you lay the groundwo... 1 week ago | 32 mins Signposts on the Road to Data Eutopia; The New Rules of the Road Bryan Glick, Editor in Chief, Computer Weekly; Sophie Stalla-Bourdillon, Senior Privacy Counsel and Legal Engineer, Immuta One of the most complex issues for both data specialists and C-level executives is ensuring that their data policies comply with global data mandates.... 1 week ago | 12 mins Load more