Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Why Threat Modeling Is Critical for Enterprise Cyber Defense Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... June 15, 2023 9:00am Using Audience Insights to Drive Value at Scale Kate Jacobsen, Manager of Marketing Programs, and Olivia Dassler, Director of Marketing Programs (BrightTALK) Buyer behavior has evolved rapidly in the last decade. B2B buyers have embraced video-based content consumption in recent years and the emergence of n... 4 months ago | 51 mins Managing data protection: If you can't measure it, you can't manage it Pragyansmita Nayak, Ph.D, Chief Data Officer | Hitachi Vantara Federal An unspoken requirement has emerged calling for IT staff to conduct data management in a non-intrusive manner. Skipping risk mitigation to avoid inter... 4 months ago | 57 mins Using Intent Data to Align to Today’s Tech Buyer Journey Jon Brown, Senior Analyst, Enterprise Strategy Group and Katie Graybeal, VP, Market Insights, TechTarget As the IT landscape changes and technology buying teams continue to evolve, sales and marketing professionals need to understand how their buyers cond... 4 months ago | 65 mins Maximize Branch & Remote Workforce Connectivity and Security with SD-WAN & SASE Meriplex Presenter: Rob Ford – VP, Solutions Engineering ; VMware Presenter: Michael Leonard – Sr. Product Marketing Manager Securely connecting your HQ, regional offices, branch locations and remote workers is critical to the success of your business. SD-WAN and SASE optimi... 1 day ago | 48 mins Simplifying Patient-Centered Clinical Trials with Trusted Data Foundation & ML Ansh Kanwar, Himanshu Jain, and Arpita Bhowmick Today’s life sciences organizations struggle with having the right patient cohort selection and patient engagement in their clinical trials. This live... 2 days ago | 58 mins Using a Framework to Guide an IT Security Review Justin T. Noble, CIA, MBC, Director of Internal Audit, Office of Audit, Risk, and Compliance, Virginia Tech IT security doesn't have to be scary. You can do many controls-based reviews without deep expertise. In this session, you will come along on a real-li... 2 days ago | 62 mins Important eDiscovery Case Law Decisions for May 2023 Doug Austin, Hon. Judge Andrew Peck (ret.), Tom O'Connor & Mary Mack The warmer weather MAY be heating up eDiscovery case law disputes! Our May 2023 monthly webinar of cases covered by the eDiscovery Today blog discusse... 1 week ago | 67 mins 5 Steps to Creating an Ethical Work Culture–And Expertly Responding to Incidents Sharlyn Lauby You get it. Being an ethical organization matters. A lot. But ethics isn’t just a quarterly HR campaign or a glossy conduct guide; in order to really... 1 week ago | 59 mins AI Regulation and the Contact Center Vince Lynch, CEO and Owen McGrath, Head of Sales, IV.AI What do Facebook, a COVID19 prediction model, and Bronx Honda all have in common? All three were specifically referenced in a recent FTC announcement ... 1 week ago | 19 mins Load more