Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date SON OF A BREACH! - #BadgeLife Special Randy Watkins, Critical Start CTO and Florida Man (aka Jonathan Singer) Conference badges have evolved from paper and plastic to collectable mini-computers of all shapes and sizes, coveted and collected by security profess... 10 months ago | 50 mins The Cybersecurity Certifications Paradox Chris Pace, Technology Advocate at Immersive Labs Why, despite the rapid pace of threats, do we still measure skills with paper? We’re part of an industry that wears its rapid pace of change as a bad... 2 years ago | 25 mins Why We're Cool: Gartner Cool Vendors in Cyber & IT Risk Management Q4 2020 Alison Furneaux, VP of Marketing and Padraic O'Reilly, Co-Founder & Chief Product Officer We’re excited to be named in the 2020 Gartner Cool Vendors in Cyber & IT Risk Management report! What makes the CyberStrong platform new, innovative,... 2 years ago | 28 mins The Human Side of DevSecOps: Building Trust with Software Development Chris Kirsch | Director of Product Marketing, Veracode With DevSecOps, it’s become even more important for security to build a strong relationship with engineering. However, “relationships and trust” is no... 2 years ago | 45 mins The Blind Spots That Exist In Enterprise IoT - With NCC Group Michael Yehoshua: SCADAfence, Ofer Shaked: SCADAfence, Matt Lewis: NCC Group & Dan Haim: SCADAfence According to Gartner, there are 5.8 billion IoT devices, and they’re growing at a rate of 21%-30% per year. Some examples are badge readers, printers,... 1 year ago | 50 mins Factoring IoT Devices into Detection and Response: A SANS Whitepaper Michael Sanders, Cloud Security Engineer at ExtraHop Networks; Matt Bromiley, Digital Forencis and IR Director at SANS IoT is growing in the enterprise and becoming of greater concern as an unprotected threat vector. An organization needs to understand if and how ente... 2 years ago | 61 mins 5 Critical Items to Consider When Securing Medical Devices Abhishek Argarwal, CISO at Fresenius Medical Care and Curtis Simpson, CISO at Armis From an MRI to an infusion pump to wireless Vocera badges to contact bluetooth beacons tracking devices, these equipment bring the promise of better m... 2 years ago | 51 mins The Human Side of DevSecOps: Building Trust with Software Development Chris Kirsch | Director of Product Marketing, Veracode With DevSecOps, it’s become even more important for security to build a strong relationship with engineering. However, “relationships and trust” is no... 2 years ago | 44 mins The Blind Spots That Exist In Enterprise IoT - With NCC Group Michael Yehoshua: VP of Marketing SCADAfence, Ofer Shaked Co-Founder and CTO SCADAfence, Matt Lewis: NCC Group, Dan Haim: Sec According to Gartner, there are 5.8 billion IoT devices, and they’re growing at a rate of 21%-30% per year. Some examples are badge readers, printers,... 2 years ago | 50 mins Securing Connected Medical Devices: The New Hippocratic Oath Curtis Simpson, CISO at ARmis Hospitals and clinics are exploding with new connected medical devices. From infusion pumps to MRI machines, x-ray machines, heart monitors, and commu... 2 years ago | 58 mins