Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... April 20, 2023 7:00am Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 4 weeks ago | 81 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... 4 weeks ago | 81 mins Crisis & Escalation of the Threat Landscape Pascal Geenenes & Daniel Smith Cybersecurity threats continue to evolve and become more sophisticated with a focus on ransomware, targeting of cloud infrastructure and social engine... April 20, 2023 3:00pm Identity is the New Attack Surface: A CISO’s Perspective Tim Choi, Ofer Israeli, and CISO Guest Speaker, Yonesy Nunez Identities are a company’s crown jewels for access and privilege in corporate systems, and attackers have begun to focus on compromised identities to ... 1 day ago | 31 mins Selecting a CSPM solution for Dynamic and Complex Cloud Environments GigaOm Analyst Cybersecurity Chris Ray, Check Point Manager of Cloud Security Center of Excellence Aaron Brongersma CSPM solutions improve the security posture of multicloud environments by proactively identifying and remediating critical misconfigurations. Differen... 3 days ago | 77 mins What's New with Diligent: Spotlight on Cybersecurity Daryn Duliba, Senior Client Executive, Diligent and Christian Starnes, Solutions Engineer, Diligent From 2019 to 2020, cyber intrusions increased by 400%, prompting increased scrutiny of how corporate boards oversee cybersecurity issues. People, proc... 2 weeks ago | 65 mins The Brick House - Why OT/ICS Cybersecurity Matters Gary Brickhouse, CISO & VP GRC Services Operational Technology (OT) environments have continued to converge with traditional IT environments. As previously siloed OT environments have been c... 2 weeks ago | 62 mins Determining the Risk of Critical Third Parties Charlie Miller - Senior Advisor, Shared Assessments, Colleen Milazzo - SVP, Shared Assessments, Hannah Ford, Supply Wisdom Leveraging third parties can lead to significant efficiencies, but it is not without risk. This session will explore criteria used to establish inhere... March 28, 2023 3:00pm Highly Productive Workplace Leveraging Tech Stack of Service Desk Zones Providing innovation, flexibility and continuity while delivering on an optimized customer experience provides the recipe for success in today's moder... March 29, 2023 4:00pm Load more