Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Transitioning into a Leadership Role in CyberSecurity Michelle Zeigler, Director of IT Security and Compliance at Nestlé IT Transitioning into a cybersecurity career looks different for many people. In this webinar, we'll be joined by WiCyS strategic partner Nestlé IT where... June 1, 2023 6:00pm PAM: We’ve Been Doing It All Wrong Martin Cannard, VP of Product Strategy at Netwrix The last two decades have seen massive change in the IT landscape: We’ve seen workloads shift from the datacenter to the cloud, applications move from... 2 weeks ago | 60 mins ChatGPT Webinar with George Kamide George Kamide George Kamide is a senior director at SafeGuard Cyber. He’s the host of the award-winning cybersecurity podcast, First Watch, where he interviews cybe... 4 days ago | 51 mins Cyber Myth Busting: Blasting Common Misconceptions Diana Kelley, Protect AI and Guests No one is a stranger to the complexity of cyber. And with confusion, comes misconception. In this special episode of The (Security) Balancing Act, Di... June 14, 2023 4:00pm Analyst Insights for GTM Actions: Lessons Learned from Security Buyers Dave Gruber, Doug Cahill Most marketing tactics fail. So much so that it’s a norm built into what and how we plan. Sometimes targeting is to blame. Often, it’s positioning and... 6 days ago | 56 mins First Line of Defense: The State of the Security Team Andrew Hollister, LogRhythm CISO and Kevin Kirkwood, LogRhythm deputy CISO. Cybersecurity is not a one-person job, but rather an entire organizational effort. In 2022, LogRhythm sought to understand the current state of the se... June 8, 2023 2:00am Ed TALKS: How to Train IT Teams for Security Ed Adams, Security Innovation | Satish Janardhanan, Accenture | Vandana Verma, OWASP, Snyk | Elena Scifleet, CyberCX The modern enterprise is highly dependent on the cloud and software-driven systems. To protect them, teams need relatable training that reflects the t... 2 weeks ago | 55 mins Roundtable: Keeping Pace With Changing Regulations Tim Ward, CUBE; Josh Toth, United Community Bank; Doreen Ghusar, JG Wentworth; Erick Alvarez & Lori Lindeman, LogicGate If there’s one constant in the banking regulatory landscape, it’s change. And we can expect to see a lot more of that in the wake of the recent bankin... 5 days ago | 45 mins Modern Applications Require Modern Application Security Melinda Marks, Senior Analyst, ESG and Erez Yalon, Vice President of Security Research, Checkmarx Application security is one of the most important components of an overall security program, yet some organizations struggle to identify and address t... 1 month ago | 31 mins Device control? User productivity? Have both with Unified Endpoint Management Darrin VandenBos, ZENworks Product Manager, OpenText IT organizations want endpoint devices to be easily managed and secured. Device users want job productivity. And both IT and end users want these rega... 3 weeks ago | 57 mins Load more