Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date 5 Critical Capabilities To Go From Legacy To Modern Endpoint Security [EMEA] Anne Aarness (Sr. Product Marketing Manager), Rachel Scobey (Technical Product Marketing Manager) According to one estimate, there will be 29.3 billion networked devices globally by 2023. Organizations and security teams are facing challenges like ... 2 days ago | 40 mins Operationalizing Third Party Cyber Risk Management Ewen O'Brien, Senior Vice President, Cyber Third Party Risk, BlueVoyant When it comes to keeping up with an organization’s critical threats, it’s important to have visibility into your third parties. Traditionally, organiz... 3 days ago | 33 mins A CISO Discussion: Don't "Default" on Email Security Ed Harris, CISO Mauser Packaging and Mike Bailey, Manager of Product Marketing Proofpoint With an increase in sophisticated phishing attacks like supplier fraud, ransomware threats, and account compromise attempts, default email security ca... 2 days ago | 32 mins Key Findings from 2022 Data Threat Report - Global Edition Eric Hanselman, Principal Research Analyst, 451 Research; Justin Lam, Research Analyst, 451 Research As the pandemic continues to affect both business and personal lives, expectations of a ‘return’ to pre-pandemic conditions have faded from most plans... 3 days ago | 58 mins Ransomware Trends: The Evolution of Threat Mike McLellan, Director of Intelligence, Marcelle Lee, Senior Security Researcher, Keith Jarvis, Senior Security Researcher What you’ll learn: The seriousness of the ransomware threat The ransomware landscape post-Colonial Pipeline attack What you can do to defend against r... May 31, 2022 1:00pm Making MITRE Matter: Ransomware Defense Revealed Mirza Baig - Senior Product Manager XDR, Michael Rosen - Director Technical Marketing, Rafe Pilling - Counter Threat Unit What you'll learn: MITRE basics – a common language for InfoSec How Secureworks maps adversarial tactics to MITRE to cover over 90% of MITRE ATT&CK TT... June 7, 2022 1:00pm [Episode - 2] Demystifying the MITRE ATT&CK Framework - Talk show Shehnaaz, Ram Vaidyanathan The episode 2 of this series talks about understanding the various attack launch techniques used by adversaries, according to the MITRE ATT&CK framewo... 2 weeks ago | 19 mins Live Panel Discussion: Is AI the Future of Cybersecurity? Johan Dreyer, Seán Doyle, Magnus Carling, Elaine Lee Addressing innovation shortfalls - Mimecast State of Email Security Report 2022 Our sixth annual State of Email Security Report found that the use of... 1 week ago | 56 mins 2022 Global Threat Report [APJ] Adam Meyers (SVP, Intelligence, CrowdStrike) For security teams on the front lines and those of us in the business of stopping breaches, 2021 provided no rest for the weary. In the face of the ma... 2 days ago | 61 mins Examining the CISO Report for Exploited Vulnerabilities | Cyber Threat Briefing Craig Moores, Risk Advisory Senior Director and Hugh Raynor, Senior Cybersecurity Consultant Join SureCloud’s Craig Moores and Hugh Raynor for our latest Cyber Threat Briefing. Craig and Hugh will be discussing the recently released CISO repor... 1 day ago | 27 mins Load more