Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date I was never here: Identity discussion with a KPMG Partner & former CSIS officer Marc Chaput (Partner Cyber Security and IAM, KPMG) , Andrew Kirsch (Former CSIS Officer) Former CSIS officer Andrew Kirsch and KPMG Identity Practitioner Marc Chaput discussed Identities, ways to exploit them, and solutions to reduce the t... 8 months ago | 42 mins Cyber CSI: Forensically Examine Phishing Emails to Protect Your Organization Roger Grimes (KnowBe4), David Littman (Truth in IT) Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your k... 7 months ago | 58 mins Charting The Course for Cybersecurity David Hatfield, Co-CEO - Lacework | Jim Langevin, US Representative - RI | Suzanne Spaulding, Senior Advisor - CSIS How is the evolving nature of increased security threats impacting our daily lives? How are governments and businesses responding to these issues? A... 11 months ago | 34 mins MaaXBoard RT: Implement TensorFlow Lite object recognition Jay Marcinczyk, Field Application Engineer, Avnet Attendees will be guided through the process of building a TensorFlow Lite object recognition embedded application. Step-by-step instructions are pro... 4 months ago | 25 mins PowerStore 500 Cristian Stan & Radu Isaia PowerStore 500 este proiectat special pentru a optimiza ciclul de viată al infrastructurii business-ului tău și te ajută să elimini eventuale costuri ... 9 months ago | 7 mins CSI and long-term improvement Barclay Rae CSI and long-term improvement, problem management , risk management and culture change – how do we make these work and last? This session takes a view... 2 years ago | 25 mins How to Demonstrate Value - The CSI Building Blocks Ian MacDonald FBCS, CITP, FSM - Independent Consultant, Edenfield IT Consulting Today, simply meeting the service commitments of the business consistently may no longer be considered enough. Your business customers will over tim... 5 years ago | 46 mins Cyber CSI: Learn How to Forensically Examine Phishing Emails Roger Grimes, Data-Driven Defense Evangelist, KnowBe4 Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your k... 3 years ago | 59 mins ITIL 4 vs ITIL v3 – From CSI to CI Allen Ureta ITIL v3 introduced Continual Service Improvement (CSI) as a service lifecycle stage that identifies and implements improvements across service strateg... 4 years ago | 53 mins Three steps to achieving TRUE cloud security Mike Raggo, CISSP, NSA-IAM, ACE, CSI: Cloud Security Expert at CloudKnox Achieving security in the cloud is an ever-moving target, making it challenging for security and cloud infrastructure teams to keep up with current ri... 2 years ago | 49 mins Load more