Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Open Source Risks with New Technologies: AI, GitHub Copilot, Blockchain & More Mark Radcliffe, DLA Piper, Anthony Decicco, GTC Law Group, Sam Ip, Osler, Hoskin, & Harcourt The evolution of newer technologies, like artificial intelligence, machine learning, GitHub Copilot, blockchain, cryptocurrencies, DeFi, APIs, contain... 3 months ago | 61 mins The 2022 Open Source Year in Review Mark Radcliffe, Partner at DLA Piper & Tony Decicco, Shareholder, GTC Law Group & Affiliates & Phil Odence, GM, Synopsys Gain insights into important legal developments from two of the leading open source legal experts, Mark Radcliffe, partner at DLA Piper and general co... 4 months ago | 67 mins Making Security Skills Stick – Findings from Ponemon Research Amy Severson, Security Innovation | Dr. Larry Ponemon, The Ponemon Institute As the notorious cybersecurity skills gap widens, organizations look for effective ways to up-level competency across diverse roles and abilities. How... 10 hours ago | 27 mins From Mandate to Execution: Building a Modern Cybersecurity Strategy Sponsored by Cribl Cyber-attacks are becoming more and more uninhibited and boundless, which means cybersecurity efforts must evolve their complexities to be able to kee... 5 days ago | 42 mins Can DNS Security Block Phishing? Paul Mockapetris, Chief Scientist at ThreatSTOP Phishing is a serious threat faced by all businesses and individuals. It may seem as though there is no way to stop phishing scams, but DNS security c... 1 week ago | 2 mins Your Secret Weapon Against Cyber Threats Desi Gavis-Hughson, Solutions Marketing Manager, Cribl and Perry Correll, Principal Technical Content Manager, Cribl In today's digital world, organizations face an ever-increasing number of security threats and cyberattacks that can lead to significant data breaches... 1 week ago | 29 mins geeks+gurus: Contextualizing Data in Higher Education Brandon Stringfield, CISO, SFASU; Michael Poeschl, Solutions Engineer, Sumo Logic We are thrilled to have you join us for our customer conversation with Brandon Stringfield, Chief Information Security Officer at Steven F. Austin Uni... June 14, 2023 6:00pm Transitioning into a Leadership Role in CyberSecurity Michelle Zeigler, Director of IT Security and Compliance at Nestlé IT Transitioning into a cybersecurity career looks different for many people. In this webinar, we'll be joined by WiCyS strategic partner Nestlé IT where... 5 days ago | 56 mins Best Practices to Protect your Institution Against Ransomware Liam Downward, CEO at CYRISMA and Snehal Contractor, VP of WW Systems Engineering & Technical Services at Stellar Cyber Join Liam Downward, CEO at CYRISMA and Snehal Contractor, Vice President of Worldwide Systems Engineering & Technical Services at Stellar Cyber as the... 3 weeks ago | 55 mins Debunking Vendor Cyber Security Myths Nasser Fattah, David Severski From speculating that vendors have terrifying security posture to guessing that vendors have water-tight security practices, organizations make assump... June 21, 2023 5:00pm Load more