Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Coffee with a Pinch of AppSec Christopher Cummings, Principal Consultant Securing your applications requires more than just tools, but which tools do you need? And where do you start? Empirical data shows that 50% of app... 2 weeks ago | 32 mins IT, Spies, and Nation States: 5 Ways to Stop Insider Threats in Government Shunta Saunders A major embarrassment, at best, and a national security threat at worst. The case of a 21-year-old Air National Guardsman charged with leaking top-sec... 3 months ago | 29 mins How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 7 months ago | 63 mins Taking Insider Risk Management to the Next Level Shunta Sharod Sanders Insider threats can hang out in your network for months undetected, with the cost for mitigation rising exponentially. In fact, on average, incidents ... 6 months ago | 21 mins How to Use Threat Intelligence to Mitigate Third Party Risk Christopher Crowley & Greg Kapourellos. Threat intelligence provides security teams with insights into the kinds of attacks that may target their organizations and prioritize their security ... 17 hours ago | 62 mins Take the Driver’s Seat from Your Cyber-Insurance Underwriter Casey Bitz, OneNeck, Nick Santilli, OneNeck and Dave Gruber, ESG With the continuing threat of ransomware and other complex attacks, cyber insurance has become a key strategy to mitigate risk. Yet, only 15% of compa... 16 hours ago | 43 mins Where Contracting Fits in the Third-Party Risk Lifecycle: 5 Opportunities Shea Hanson, OneTrust and Andrew Moyad, Shared Assessments Managing the third-party lifecycle involves stakeholders across many business units: information security, privacy, legal, finance, procurement, and o... 3 days ago | 62 mins ESG Controls and Governance: Examining Critical Oversight Needs Experts at Ernst & Young LLP The phrase “Environmental, Social, and Governance (ESG) controls” refers to the policies, procedures, and systems that companies implement to manage a... 2 days ago | 61 mins OWASP Top 10: Broken Access Control - Ep 1 John Wagnon, Solutions Architect, F5 94% of tested apps showed some form of broken access control. Failures can result in unauthorized disclosure, modification or destruction of data, pri... 1 day ago | 11 mins Using Asset Context and Vulnerability Criticality to Prioritize Endpoint Risk Fiona Ing, CrowdStrike | Tal Morgenstern, Vulcan Cyber | Nathan Shock, Kudelski Security Endpoint risk in and of itself is manageable, especially for CrowdStrike customers. But how does the complexity, interconnectedness and scale of moder... September 28, 2023 4:00pm Load more