Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Operationalizing Third Party Cyber Risk Management Ewen O'Brien, Senior Vice President, Cyber Third Party Risk, BlueVoyant When it comes to keeping up with an organization’s critical threats, it’s important to have visibility into your third parties. Traditionally, organiz... 1 week ago | 33 mins The Critical ‘3 P’s’ of Incident Response Planning Adam Mansour, Chief Security Officer | Aaron McIntosh, Director of Product Marketing There’s no better time to deal with a cybersecurity incident than before it has ever happened. Most midsize businesses have at the very least a bare-b... 18 hours ago | 30 mins Don't Let Legacy Splunk Derail your Security and Application Modernization Stefan Zier I Chief Architect, Akash Kadakia I Professional Services Manager, Manny Lopez I Principal Manager, Girish Bhat VP Handling today’s business challenges, accelerating innovation, gaining efficiency and minimizing risk requires a complete rethink and redo. Relying on... 21 hours ago | 58 mins Cyber-Warfare: Is Your Critical OT Infrastructure Ready? Martyn Crew, Sr. Director, Industry Solutions - Gigamon + Keith Walsh, Director of OT Strategy and Operations - Armis The war has come to you. From state sponsored actors to financially motivated criminals, all kinds of cyber-threats are targeting your critical soluti... 2 days ago | 42 mins Ransomwares et comportements déviants sur votre réseau d’entreprise avec Flowmon Laurent Kieffer, Senior Sales Engineer et Yann Bouillon, Responsable Technique Kemp-Flowmon Au cours de ce webinaire, nous expliquerons comment détecter les ransomwares et les comportements anormaux sur le réseau de votre entreprise avec Flow... 1 day ago | 29 mins Streamline Response with Threat Intelligence and SOAR Digital Shadows CEO and Co-Founder Alastair Paterson and VP Product Strategy, Palo Alto Networks, Rishi Bhargava How best-practice organizations are taking their security operations to the next level Security teams need threat intelligence. Done correctly, it pro... 2 days ago | 28 mins How SASE Can Be Used To Deliver Better User Experiences? Neelum Khan - SASE Product Evangelist What is SASE-Native Digital Experience Monitoring? Watch how Neelum Khan, SASE Product Evangelist, explains why Autonomous Digital Experience Manageme... 24 hours ago | 4 mins Flowmon - NDR Netwerk Security Maarten Labadie, Partner Account Manager Benelux en Tonny van der Cammen, Sales Engineer, Principal Ben je als leverancier van netwerk oplossingen, IT professional of pre-sales engineer dagelijks bezig met netwerkbeheer en netwerkveiligheid? Bekijk d... May 30, 2022 8:00am Cybercrime: Tools, Techniques & Trends for 2022 The Ozark Edition Kurt Baumgartner and Sergey Lozhkin, GReAT Want an insider’s view of the latest cybercrime activity? Grab a seat as Kaspersky Global Research and Analysis Team (GReAT) members, Kurt Baumgartne... 2 days ago | 48 mins SANS: Ransomware Defense in 2022 Matt Bromiley, SANS Certified Instructor + Chris Borales, Sr. Product Marketing Manager - Gigamon Originally aired on a SANS webcast. The years 2020 and 2021 were undoubtedly the years of ransomware. Threat actors wasted no time taking advantage o... 2 days ago | 75 mins Load more