Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Top 3 Observability Data Predictions Nick Heudecker, Senior Director, Market Strategy, Cribl Why do we make predictions? Making predictions, or getting insight of what is coming, gives us a sense of control over an uncertain future. IT, securi... 4 hours ago | 36 mins Innovate Safely and Securely at the Edge Theresa Lanowitz AT&T Head of Cybersecurity Evangelism and Steve Winterfeld, Advisory CISO, Akamai Security is at the center of digital transformation efforts. Part of those digital transformation allow for innovation at the edge with new network ar... 5 hours ago | 35 mins Command and Control - a deeper look at DNS (ab)use Reuben Koh, Director, Security Technology and Strategy, APJ, Akamai DNS traffic is a highway of information, which can include many aspects of a modern attack, including Command-and-Control (C2) traffic, multi-staged a... 16 hours ago | 58 mins Utilize Threat Intelligence, Establish Command & Control - Webinar Series Part 2 Danielle Restaino, Emily Cranston, Principal Consultants, Mandiant Jim Meyer, Sr. Principal Consultant, Mandiant This session is the second in our multipart virtual series that will provide helpful insights and best practices surrounding the six critical function... March 30, 2023 3:00am UBO 2.0 – Data and tech for the future of beneficial ownership Neil Isherwood - Compliance Expert & Strategy Leader, Dun & Bradstreet Determining the ultimate beneficial owners (UBO) of individuals and companies your firm does business with has traditionally been complex, but it’s im... March 29, 2023 9:30am Cymulate Cyber Resilience 2023: Lessons Learned from 1.5 Million Hours of Tests Mike DeNapoli, Director, Cybersecurity Architect, Cymulate Cymulate Cybersecurity Effectiveness Report: What We Learned from 1,725,720 Hours of Security Testing In one year, Cymulate has helped customers wi... March 29, 2023 5:30pm Building a Modern Exposure Management Program Paul Giorgi, Director of Sales Engineering North America This session provides a comprehensive overview of the evolution of vulnerability management and explains why critical vulnerabilities do not necessari... 2 days ago | 40 mins Take Control of Your Cloud Data Security Terry Ray, SVP, Data Security GTM, Imperva & Author Richard Stiennon of IT Harvest Take Control of Your Cloud Data Security: Best Practices for Proactive Protection in Any Cloud Service Looking to secure your cloud data but don't kn... 5 days ago | 60 mins The Data-Driven Journey To Manufacturing Data Excellence Webinar Sam Poursoltan, Principal Consultant - APJ Data Services, Rackspace Technology Data analytics is becoming increasingly important for the manufacturing industry and by 2023, it is predicted that the global manufacturing market for... 2 days ago | 87 mins Take Control of Your Cyber Defense with The Defender’s Advantage Series, Part 1 Kerry Matre, Sr. Director, Product, Solutions Marketing, Mandiant, Jennifer Guzzetta, Sr. Product Marketing Mgr, Mandiant Learn how to activate the six critical functions of Cyber Defense to optimize your security program in the face of harmful adversaries. Building a bes... 6 days ago | 53 mins Load more