Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date A CXO's guide to application security in the age of digital transformation Elango Balusamy, Co-founder & CTO | SquareShift Technologies Enterprises are increasingly relying on applications to drive business growth and success in the age of digital transformation. However, the rise of c... June 6, 2023 8:00am Why Threat Modeling Is Critical for Enterprise Cyber Defense Jake Williams, Security Researcher & Christopher Cummings, Principal Consultant. Moderated by Becky Bracken from Dark Reading As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. ... June 15, 2023 9:00am Explore application security tools and testing to strengthen software defenses Pankul Chitrav, Application Release Engineer | TD Bank In today's digital landscape, ensuring the security of software applications has become paramount. With the rise in cyber threats and the potential fo... June 7, 2023 5:00pm CISO Perspectives on Cyber Security with Limited Resources - CyberRisk Summit Frank Kim, YL Ventures CISO in residence Now more than ever cyber security teams are being asked to do more with less and to get the most out of existing investments in people and tools. Atte... June 14, 2023 4:00pm Top Recommendations For Your Security Program, 2023 Guest speaker, Heidi Shey, Principal Analyst, Forrester * Chris Peel, VP Customer Engineering, Echoworx The tech landscape security leaders protect - and use - is set for major changes as critical elements of security, including encryption, experience ma... 2 weeks ago | 37 mins Strategies to Support Channel Marketing Programs in EMEA Vijay Mistry (ThousandEyes), Neil Langridge (e92Plus), Simon Quicke (TechTarget | MicroScope), Jimmy Lee (TechTarget) In the current economic climate, it’s critical vendors have a clear go-to-market (GTM) strategy to support their channel partners and to help drive pi... 2 weeks ago | 61 mins Future Insights 2023 Simon Wiseman, Chief Technology Officer, Forcepoint & Alexandra Willsher, GSI Technical Consultant, Forcepoint What threats will enterprises and government organizations face in 2023? Join us for a fireside chat discussing the Future Insights 2023 series, wher... 4 months ago | 64 mins Comprehensive Software Due Diligence with Black Duck Audits Phil Odence, Synopsys To get a holistic view of the software risk inherent in an acquisition, it’s critical to assess the software development organization and processes an... 3 weeks ago | 59 mins TIP Functionality That Moves the Needle Mark Bermingham, Willy Leichter Threat intelligence is only valuable if your organization can ingest, process, enrich, correlate, prioritize, and take action based on these threat in... 9 hours ago | 46 mins How to Supercharge your CMDB and Realize Value Sooner Mike Mahoney, Sr. Director, Partner Marketing, Technology Alliances at Tanium Your Configuration Management Database (CMDB) should be the single source of truth to power effective processes and decision-making across your IT org... 1 day ago | 26 mins Load more