Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Getting to Know SASE: Part 1 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC As CSO Online explains, “Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation ... June 28, 2022 12:00pm CxO InSyte series: Take control of your cloud infrastructure security Maurice Stebila, CISO, HARMAN a Samsung Company | Anthony Belfiore, CSO, Wiz | Yinon Costica, VP of Products, Wiz Cloud has driven innovation and agility for organizations. For security teams, it has also brought new levels of complexity. Multiple clouds, misconfi... June 28, 2022 3:00pm Build, Manage, and Automate a Secure PKI for your Organization Murali Palanisamy, CSO, AppViewX and Tan Yu Win, VP Project Management, SecureMetric Over the past decade, PKI has come to be recognized as the gold standard for protecting information and networks using encryption. The phenomenon of d... June 28, 2022 4:00pm Regulatory Spotlight on Strengthening Information Security & Privacy Black Kite CSO, Bob Maley, & CEO of Solem Risk Partners LLC, Linnea Solem What's New for 2022? How has the regulatory landscape changed in the last 3 years for third-party risk management? Hear from Linnea Solem and Bob Mal... 3 days ago | 34 mins The Past, the Present, and the Future with Andy Steingruebl of Pintrest Andy Steingruebl, CSO, Pinterest, and Andy Ellis, Advisory CISO, Orca Security When someone says Pinterest, the first thing that comes to mind is a social platform and a place to seek inspiration. But for the people working behin... 5 days ago | 32 mins Getting to Know SASE: Part 1 Kevin Beaver, CIISP, Independent Information Security Consultant, Principle Logic LLC As CSO Online explains, “Edge is the concept that moves computing from a centralized model to a decentralized one, away from datacenter consolidation ... June 28, 2022 4:00am Discover the Unknown Knowns: Ransomware in Manufacturing Supply Chains Black Kite CSO, Bob Maley, & Cybersecurity Risk Manager at Bradley Consulting, Ron Bradley The manufacturing industry transformed to digital more rapidly than any other industry during the global Covid-19 pandemic. Learn key indicators for r... 3 weeks ago | 28 mins Get Ahead of Attackers with Multi-Layered DDoS Protection - Radware x CSO Eva Abergel Radware, Stan Gibson, CSO If you were told that you could be protected from DDoS attackers before they even targeted your organization, would you believe it? In this webinar, w... 2 months ago | 15 mins Get Ahead of Attackers with Multi-Layered DDoS Protection - Radware x CSO Eva Abergel Radware, Stan Gibson, CSO If you were told that you could be protected from DDoS attackers before they even targeted your organization, would you believe it? In this webinar, w... 2 months ago | 18 mins How to Build a Strong Data Security Strategy (Panel Discussion) Jack Poller, ESG | James Christiansen, Netskope | David Richardson, Lookout IT and infosec teams must think proactively and creatively about their data protection strategies, but getting there can be challenging. In this panel... 2 weeks ago | 44 mins Load more