Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Taking Zero Trust to 100%: Best Practices to Support your Journey Alexandra Willsher, Forcepoint | John Leonard, Computing | Anne Cockshott, The Channel Company EMEA Zero Trust is widely regarded as the best approach for protecting organizations, but implementing it is a journey rather than a one-off purchase. The... March 22, 2023 9:00am Illuminate the Blind Spots: Why your security investments are failing Dawid Kowalski - Senior Director Field Engineering, EMEA, FireMon We all know the story. The threat landscape is ever-evolving and security teams have to stay ahead of the curve and protect their networks. But what i... 4 hours ago | 48 mins Discover and Remediate Domain Credential Exposures Rinat Villeval Phishing attacks are proving to be the most successful attack method of 2022. And the one thing they all have in common is leveraging abused Domain Cr... March 22, 2023 12:00pm Boost productivity with a modern database architecture with Confluent & AWS Joseph Morais, Staff Cloud Partner SA, Confluent | Riggs Goodman, Senior Networking Partner SA, Amazon Web Services (AWS) Cloud databases enable critical business insights and advanced analytics for organizations. With Confluent, you can build streaming data pipelines fro... 3 hours ago | 34 mins 2023 Proxy Preview: ESG at the crossroads Alex Whitebrook, ESG Communications Manager In this global review of shareholder voting in the FTSE350, Minerva's Senior Stewardship Analyst, Thomas Bloger, discusses the latest trends in ESG an... March 23, 2023 10:00am Cyber Notes Cast - How to Manage Privileges in Endpoints? senhasegura If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tabl... March 22, 2023 3:00pm Build a modern threat intelligence program based in automation Ansh Patnaik, Chief Product Officer at CyCognito There is a change underway in terms of how Security teams validate potential exploits using threat intelligence. Until very recently, most Security te... March 23, 2023 5:00pm Preventing & Detecting Employee Expense Fraud in Your Organisation Mark Wilfred (SAP Concur), Munenori Iwanaga (SAP), Ross MacKay (International SOS) According to Occupational Fraud 2022: A Report to the Nations, expense reimbursement makes up 11% of all asset misappropriation cases, which ranks thi... March 23, 2023 2:00am Rise of the Machines Dr. Zero Trust, Chase Cunningham It seems like the market has finally agreed that we need to manage user identities, and that's a good thing. But what are we doing about "the machine... 6 days ago | 30 mins Protecting Critical Utilities Customers & Assets w/ Computer Vision AI Solutions Chris Lenzsch (Dell Technologies), Reynaldo Gomez (NVIDIA), Mai Truong (IronYun), Kit Bishop (Convergint) Recent acts of vandalism targeted at Duke Energy’s substations have affected over 36,000 customers in Moore County, NC, leaving people literally in th... 4 weeks ago | 62 mins Load more