Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date IBM QRadar XDR helps security professionals to make business secure KaWon Cho and ByongJun “BJ” Na Taking Threat Detection and Response to the Next Level with Open XDR The challenges facing today’s security industry can easily be described as a per... 3 days ago | 27 mins Phishy Business - Closing the cybersecurity skills gap through education Ina Steyn, Shenaaz Abrahams In this episode of Phishy Business, we take a look at the skills shortage being faced by IT departments when it comes to hiring cybersecurity experts ... April 4, 2023 10:00am Improve Security Efficiency and Effectiveness with Cisco Secure John Grady, Enterprise Strategy Group; Frank Lento, Cisco; Pat Sullivan, Sr. CDW As the threat landscape continues to grow in complexity, staffing shortages progress, and difficulty in managing disconnected point tools becomes a ma... April 13, 2023 4:00pm How 4 Cybersecurity Companies Protect Against Cloud Vulnerabilities Ryan Kazanciyan, CISO, Wiz, Michael Mestrovich, CISO, Rubrik, Karl Mattson, CISO, Noname, Mike Britton, CISO, Abnormal Wiz. Rubrik. Noname. Abnormal. You know them as security companies that were created to provide superior cybersecurity protection against the most adv... April 11, 2023 5:00pm Overcoming Ransomware in the Enterprise: The State of the Market Christophe Bertrand - ESG, Sreeharsha Sarabu - Veritas, Chris Drieberg and Suhanya Ramakrishnan - Hitachi According to recent Enterprise Strategy Group research, 79% of organizations surveyed have experienced a ransomware attack within the last 12 months. ... April 13, 2023 2:00pm Innovation Showcase Ep.2: A standard approach to custom SOC Verizon The security industry knows a large number of terms that all describe managed SOC-based services: MSS, MDR, Managed SIEM, Advanced SOC, etc. Furthermo... 1 week ago | 39 mins Attack Surface Management and Security Hygiene and Posture Management Jon Oltsik, Senior Principal Analyst & ESG Fellow INSIDE SECURITY HYGIENE AND POSTURE MANAGEMENT Managing a healthy security posture and hygiene in an ever-growing attack surface is challenging. Ever... 2 weeks ago | 60 mins Mind the gap: How to find, prioritize, & manage vulnerable assets Karl Klaessig and Mike Plavin of ServiceNow Many organizations and their security teams are overwhelmed trying to keep up with vulnerabilities and cyber threats. Not only is prioritization a cha... 3 weeks ago | 53 mins 3 Signs It Is Time to Re-Solution Your SIEM for XDR Nick Cavalancia - Techvangelism, Ryan Alban - Sr Manager, Systems Engineering, Secureworks & Carrie Goetz - CTO, StrategITcom There’s no doubt that security information and event management (SIEM) platforms provide powerful threat detection tools. But SIEM technology has its ... April 18, 2023 1:00pm Unconventional Approaches to Cybersecurity Talent Development Jim Routh, Board Member, Advisor & Investor, Former CSO, CISO; Simone Petrella, CEO & Co-Founder of CyberVista The supply of skilled cyber talent was, is, and will be well below the demand for talent, forcing cybersecurity leaders to commit to innovative talent... 2 months ago | 47 mins Load more