Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Limiting the Impact of Future Ransomware Threats Melinda Marks, Senior Analyst, ESG | Matt Hathaway, Chief Strategy & Marketing Officer, TrueFort Cyberattackers are not showing any signs of slowing down -- in fact, cyberattacks are worsening. Several factors are responsible for that with some be... August 16, 2022 6:00pm Cybersecurity Resiliency Framework Built on a Foundation of Threat Intelligence Matt Aldridge and Michael Suby Cyber resilience can be an intimidating topic for any business, but the risk of a cyber attack is higher than ever. It is critical for companies to ta... August 18, 2022 4:00am geeks+gurus: Summer of Security Dana Torgersen, Enrico Benzoni, and Fabian Rodriguez Join our geeks+gurus of Sumo Logic for an interactive conversation on the current state of cybersecurity. In this 25-minute conversation, Dana Torgers... August 18, 2022 6:00pm The CISO’s Guide to Reporting Cyber Risks to the Board Henry Jiang, CISO at Diligent Cybersecurity is top of mind for modern boards of directors, and CISOs have a significant voice in the conversation today. So how can CISOs use their ... 4 days ago | 46 mins Navigating a New Era of Email-Driven Attacks Dave Gruber, Principal Analyst, ESG and David Raissipour, CTO/CPO, Mimecast The 2022 State of Email Security Report is out and makes it clear that businesses around the world find themselves in the crosshairs of a torrent of n... 6 days ago | 30 mins Implementing an Attack Surface Management Program Dave Gruber, Principal Analyst at ESG and Jonathan Trull, CISO & SVP of Solutions Architecture of Qualys Cybersecurity teams must move faster than attackers when vulnerabilities are disclosed. This is only possible if the attack surface is mapped out cont... 6 days ago | 34 mins Demystifying the Tradecraft of a Threat Informed Defense Robert Wallace, Sr Dir, Mandiant ; Paul Caiazzo, Chief Officer, SnapAttack; Arve Kjoelen, VP & Global Chief SO, SnapAttack Traditionally, threat hunting and intelligence are reliant on what has already happened: where the adversary has been, what they deployed, and how the... August 25, 2022 4:00pm Modern Applications Require Modern Application Security Melinda Marks, Senior Analyst, ESG and Erez Yalon, Vice President of Security Research, Checkmarx Application security is one of the most important components of an overall security program, yet some organizations struggle to identify and address t... 5 days ago | 32 mins Are You Prepared to Thrive Online This Holiday Season.. And Beyond? Akamai Technologies Geo-political tensions, supply chain pressures, waning consumer confidence, increasing cyber risk – all remain top of mind concerns for retailers with... 5 days ago | 55 mins Achieving Business Sustainability with Cyber Risk Quantification Jasper Ossentjuk, NielsenIQ | Anna Sarnek, SecurityScorecard | Tom Bechtold, SecureWorld Cyber risk is not a technology problem that can be siloed away to IT. It has implications for the entire organization and if not addressed accordingly... 4 weeks ago | 61 mins Load more