Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Ep 10 - Australia and NZ Cyber Threat Intelligence Briefings Mark O'Hare, Mimecast CISO; Alison O'Hare, Senior Director of Sales Engineering This session focused on the risk of QR codes and the importance of performing a premortem to assess supply chain compromise. The team also covered a ... 7 months ago | 56 mins Safeguarding Confidential Data from the Most Common Cyber Attacks Law Firms Face Mark Sangster, Rob McLeod, Keegan Keplinger Legal Threat Intelligence: Safeguarding Confidential Data from the Most Common Cyber Attacks Law Firms Face in a Virtual World Law firms have continu... 12 months ago | 55 mins Modernizing Workplace Login: Securing Enterprises - EMEA Nic Sarginson - Yubico // Gerhard Zehethofer - ForgeRock // Allen Storey - Intercede Wherever any organization is on its path to modernizing the workplace, they require modern and more secure authentication approaches to protect critic... 1 year ago | 55 mins A Year in Review of The Most Widely Used Malicious Command & Control (C2s) Infra Glen Lesnewich Malicious command and control families and tools can be tough to keep an eye on. Identifying and monitoring suspicious servers is a tall order. Someti... 1 year ago | 42 mins Modernizing Workplace Login: Securing Enterprises - EMEA Nic Sarginson - Yubico // Gerhard Zehethofer - ForgeRock // Allen Storey - Intercede Wherever any organization is on its path to modernizing the workplace, they require modern and more secure authentication approaches to protect critic... 2 years ago | 56 mins Supporting CIS Critical Security Controls with ForeScout Darrell Kesti, Account Manager & Dean Kratzer, Senior Product Marketing Manager, ForeScout Technologies The Center for Internet Security has defined required controls for effective cyber defense (CIS Critical Security Controls). How do they relate to you... 6 years ago | 33 mins Is Security Spend Proportionate to Cyber Resiliency? Richard Turner, President EMEA, FireEye There is an assumption that the more you spend on security technology, the more secure you will be. However, it is evident from the media that even th... 6 years ago | 46 mins CISO Says: Interview with Ivan Holman, Group Information Security Officer, EWI Speaker: Ivan Holman, Group Information Security Officer, EWI, Moderator: Adrian Davis, Managing Director (ISC)² EMEA In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an e... 6 years ago | 61 mins An Unvarnished Assessment of ForeScout Visibility Robert Smithers, Miercom President and CEO When a disruptive technology emerges, it is often met with skepticism. A good case in point is ForeScout CounterACT®. It’s gaining a lot of traction i... 6 years ago | 50 mins SANS Health Care Provider Breaches and Risk Management Roadmap Sandeep Kumar, Director of Product Marketing, Forescout This webcast will look at health care security from the top down, focusing on what the survey tells management in terms of priorities, breach manageme... 6 years ago | 62 mins