Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Frontline Perspectives: Performance & Outlook of the Global Real Estate Industry Chris Tsichlas, Steven Jellinek, Mirco Iacobucci, Erin Stafford With a turbulent economic environment, the Global Corporate Real Estate, North American CMBS and European CMBS sectors are facing varying headwinds. D... 5 days ago | 57 mins Marketing Matchmaking: 3 Steps to Finding Your Best Leads Suzy Balk, Marketing Campaigns Manager, Act-On Online dating apps might claim love at first swipe, but there’s actually a lot going on behind the scenes to find your perfect match. Preferences lik... 2 weeks ago | 51 mins Sales Matchmaking: 3 Steps to Finding Your Best Leads Deeksha Taneja Sr. Director of Growth & Optimization, ZoomInfo & Dom Catabay Director, Demand Generation, Act-On Online dating apps might claim love at first swipe, but there’s actually a lot going on behind the scenes to find your perfect match. Preferences lik... 2 weeks ago | 51 mins 5 Reasons for Including ERP in Your Vulnerability Mgmt Program David D'Aprile, VP of Product Marketing, Onapsis Frequently thought of as a “black box” for many reasons, SAP and Oracle application landscapes present challenges for modern day security professional... 2 weeks ago | 30 mins A Master Class on Cybersecurity: Password Best Practices Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist; Brandon Dunlap, Moderator What really makes a “strong” password? And why are you and your end-users continually tortured by them? How do hackers crack your passwords with ease?... 2 months ago | 60 mins CISO Series: How Advanced Threat Prevention Can Empower Your SOC Team John Rogers CISO at MSCI Inc.; James Alliband at Tessian, John Filitz at Tessian Efficient security operations center (SOC) teams are crucial to having effective cyber security. Therefore, as threats continue to advance—evolving i... 3 months ago | 50 mins How to Leverage Cracked Credentials for Better Exposure Management Jake Flynn, Sales Engineer at Pentera Enforcing password policy is a critical part of the scope of any security team - but most don’t necessarily have the bandwidth. Another way to go is t... 8 months ago | 23 mins Can’t see the wood for the trees? Alain Le Moeligou, Senior Solutions Architect, Mandiant Networks are becoming more complex, and cyber security teams are expected to protect company assets across multiple cloud and internal jurisdictions. ... 10 months ago | 37 mins Crack the Code to Enhancing Application Performance David Izumo - Principal Technical Marketing Engineer Is the root cause of your application performance problems frustrating? Trying to understand the root cause of your application performance problems i... 2 years ago | 21 mins Crack squads: what can product teams learn from elite military units? Paul Lacey, Head of Product at Seccl Working in a fast-growing tech company can sometimes feel like operating in a battlefield: chaotic, reactive, unpredictable and, yes, stressful. In th... 2 years ago | 53 mins Load more