Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Driving Security Resilience in an Ever-Changing World Ankur Chadda - Leader, Product Marketing, Cisco We all know that avoiding cyberattacks one hundred percent of the time is unrealistic. Our networks have become too complex and dispersed to catch eve... 9 hours ago | 36 mins Combating Advanced Supply Chain, Cloud and Identity-Based Attacks [EMEA] Jason Rivera, Senior Director - Strategic Threat Advisory Group As organizations have rapidly migrated to the cloud, adversaries have honed their craft to exploit the gaps that leave businesses vulnerable to cybera... August 25, 2022 9:00am Is Your Security Engineered To Beat Social Engineering? Matt Aldridge, Principal Solutions Consultant Social engineering tactics – using the art of deception in cyberattacks – have climbed to the top spot as the #1 cause of cybersecurity breaches. Our ... 1 week ago | 44 mins A Partnership Initiative of Industry and Academia Deveeshree Nayak, Assistant Teaching Professor, University of Washington At present, Cyberattacks are not limited to any particular industry. Academia and industries must work together to determine solutions to protect the... 4 weeks ago | 29 mins Driving Security Resilience in an Ever-Changing World Ankur Chadda - Leader, Product Marketing, Cisco We all know that avoiding cyberattacks one hundred percent of the time is unrealistic. Our networks have become too complex and dispersed to catch eve... 3 weeks ago | 36 mins How to protect your data using Application Layer Encryption Kim Christensen 95 percent of data breaches are cause by human errors, and with an average cost of a data breach globally being $3.92 million, it is not only a privac... September 14, 2022 11:00am Voice of the CISO Report 2022: The year cybercrime went primetime Andy Rose, Resident CISO, Proofpoint It may have been less eventful than the year it followed, but 2021 was another testing time for cybersecurity professionals. To find out how CISOs cop... 2 months ago | 59 mins Fireside Chat : Bringing Trust and Security to Blockchain Joe CAI, Chief Security Officer, HashKey Group; Jeff CHEN, Sales Engineer Manager, Greater China and Korea, Thales Within a permissioned blockchain, transactions are validated and processed by participants that are already recognized by the ledger. Despite this, th... 3 months ago | 48 mins 10 of the Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them Roger Grimes (KnowBe4), Dave Littman (Truth In IT) It feels like we hear about a new devastating cyberattack in the news every day. And attack methods seem to be proliferating at an exponential rate. S... 6 hours ago | 67 mins The Insecurity of Connected Devices 2022 Larry Ponemon, Leon Lerman, Chad Holmes The recent release of "The Insecurity of Connected Devices 2022" by Ponemon Institute and Cynerio has shed new light on the widespread cyberattacks th... 3 hours ago | 61 mins Load more